Created
May 3, 2021 19:41
-
-
Save jvitor03/89cb2d10213cebefcd76e95046118968 to your computer and use it in GitHub Desktop.
Retry fix in aws_ssoadmin_managed_policy_attachment for eventual conistency
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2021/05/03 01:28:44 [INFO] Terraform version: 0.14.7 | |
2021/05/03 01:28:44 [INFO] Go runtime version: go1.15.6 | |
2021/05/03 01:28:44 [INFO] CLI args: []string{"/Users/jvitor/.tfenv/versions/0.14.7/terraform", "destroy", "-auto-approve"} | |
2021/05/03 01:28:44 [DEBUG] Attempting to open CLI config file: /Users/jvitor/.terraformrc | |
2021/05/03 01:28:44 Loading CLI configuration from /Users/jvitor/.terraformrc | |
2021/05/03 01:28:44 [DEBUG] checking for credentials in "/Users/jvitor/.terraform.d/plugins" | |
2021/05/03 01:28:44 [DEBUG] Explicit provider installation configuration is set | |
2021/05/03 01:28:44 [TRACE] Selected provider installation method cliconfig.ProviderInstallationDirect with includes [] and excludes [] | |
2021/05/03 01:28:44 [INFO] CLI command args: []string{"destroy", "-auto-approve"} | |
2021/05/03 01:28:44 [TRACE] Meta.Backend: no config given or present on disk, so returning nil config | |
2021/05/03 01:28:44 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory | |
2021/05/03 01:28:44 [DEBUG] New state was assigned lineage "0e8b7077-e1dd-9941-a212-971125ee1d1b" | |
2021/05/03 01:28:44 [TRACE] Meta.Backend: using default local state only (no backend configuration, and no existing initialized backend) | |
2021/05/03 01:28:44 [TRACE] Meta.Backend: instantiated backend of type <nil> | |
2021/05/03 01:28:44 [TRACE] providercache.fillMetaCache: scanning directory .terraform/providers | |
2021/05/03 01:28:44 [TRACE] getproviders.SearchLocalDirectory: .terraform/providers is a symlink to .terraform/providers | |
2021/05/03 01:28:44 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/aws v3.38.0 for darwin_amd64 at .terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64 | |
2021/05/03 01:28:44 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/null v3.1.0 for darwin_amd64 at .terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64 | |
2021/05/03 01:28:44 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64 as a candidate package for registry.terraform.io/hashicorp/null 3.1.0 | |
2021/05/03 01:28:44 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64 as a candidate package for registry.terraform.io/hashicorp/aws 3.38.0 | |
2021/05/03 01:28:45 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/03 01:28:45 [DEBUG] Provider registry.terraform.io/hashicorp/aws is overridden to load from /Users/jvitor/golang/bin | |
2021/05/03 01:28:45 [DEBUG] checking for provisioner in "." | |
2021/05/03 01:28:45 [DEBUG] checking for provisioner in "/Users/jvitor/.tfenv/versions/0.14.7" | |
2021/05/03 01:28:45 [DEBUG] checking for provisioner in "/Users/jvitor/.terraform.d/plugins" | |
2021/05/03 01:28:45 [INFO] Failed to read plugin lock file .terraform/plugins/darwin_amd64/lock.json: open .terraform/plugins/darwin_amd64/lock.json: no such file or directory | |
2021/05/03 01:28:45 [TRACE] Meta.Backend: backend <nil> does not support operations, so wrapping it in a local backend | |
[33m | |
[1m[33mWarning: [0m[0m[1mProvider development overrides are in effect[0m | |
[0mThe following provider development overrides are set in the CLI configuration: | |
- hashicorp/aws in /Users/jvitor/golang/bin | |
The behavior may therefore not match any released version of the provider and | |
applying changes may cause the state to become incompatible with published | |
releases. | |
[0m[0m | |
2021/05/03 01:28:45 [INFO] backend/local: starting Apply operation | |
2021/05/03 01:28:45 [TRACE] backend/local: requesting state manager for workspace "default" | |
2021/05/03 01:28:45 [TRACE] backend/local: state manager for workspace "default" will: | |
- read initial snapshot from terraform.tfstate | |
- write new snapshots to terraform.tfstate | |
- create any backup at terraform.tfstate.backup | |
2021/05/03 01:28:45 [TRACE] backend/local: requesting state lock for workspace "default" | |
2021/05/03 01:28:45 [TRACE] statemgr.Filesystem: preparing to manage state snapshots at terraform.tfstate | |
2021/05/03 01:28:45 [TRACE] statemgr.Filesystem: existing snapshot has lineage "f3d9469f-7e9f-8cd8-2a1a-360f396786aa" serial 372 | |
2021/05/03 01:28:45 [TRACE] statemgr.Filesystem: locking terraform.tfstate using fcntl flock | |
2021/05/03 01:28:45 [TRACE] statemgr.Filesystem: writing lock metadata to .terraform.tfstate.lock.info | |
2021/05/03 01:28:45 [TRACE] backend/local: reading remote state for workspace "default" | |
2021/05/03 01:28:45 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate | |
2021/05/03 01:28:45 [TRACE] statemgr.Filesystem: read snapshot with lineage "f3d9469f-7e9f-8cd8-2a1a-360f396786aa" serial 372 | |
2021/05/03 01:28:45 [TRACE] backend/local: retrieving local state snapshot for workspace "default" | |
2021/05/03 01:28:45 [TRACE] backend/local: building context for current working directory | |
2021/05/03 01:28:45 [TRACE] terraform.NewContext: starting | |
2021/05/03 01:28:45 [TRACE] terraform.NewContext: loading provider schemas | |
2021/05/03 01:28:45 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/aws" | |
2021-05-03T01:28:45.395-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:28:45.479-0300 [DEBUG] plugin: starting plugin: path=/Users/jvitor/golang/bin/terraform-provider-aws args=[/Users/jvitor/golang/bin/terraform-provider-aws] | |
2021-05-03T01:28:45.517-0300 [DEBUG] plugin: plugin started: path=/Users/jvitor/golang/bin/terraform-provider-aws pid=30226 | |
2021-05-03T01:28:45.518-0300 [DEBUG] plugin: waiting for RPC address: path=/Users/jvitor/golang/bin/terraform-provider-aws | |
2021-05-03T01:28:45.588-0300 [INFO] plugin.terraform-provider-aws: configuring server automatic mTLS: timestamp=2021-05-03T01:28:45.588-0300 | |
2021-05-03T01:28:45.682-0300 [DEBUG] plugin.terraform-provider-aws: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin860030569 network=unix timestamp=2021-05-03T01:28:45.682-0300 | |
2021-05-03T01:28:45.682-0300 [DEBUG] plugin: using plugin: version=5 | |
2021/05/03 01:28:45 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:28:45.790-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:28:46 [TRACE] GRPCProvider: Close | |
2021-05-03T01:28:46.105-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:28:46.112-0300 [DEBUG] plugin: plugin process exited: path=/Users/jvitor/golang/bin/terraform-provider-aws pid=30226 | |
2021-05-03T01:28:46.112-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:28:46 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/null" | |
2021-05-03T01:28:46.112-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:28:46.185-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5] | |
2021-05-03T01:28:46.298-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30232 | |
2021-05-03T01:28:46.299-0300 [INFO] plugin.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:28:46.209-0300 | |
2021-05-03T01:28:46.299-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 | |
2021-05-03T01:28:46.358-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:28:46.359-0300 [DEBUG] plugin.terraform-provider-null_v3.1.0_x5: plugin address: network=unix address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin144419087 timestamp=2021-05-03T01:28:46.358-0300 | |
2021/05/03 01:28:46 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:28:46.510-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:28:46 [TRACE] GRPCProvider: Close | |
2021-05-03T01:28:46.514-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:28:46.516-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30232 | |
2021-05-03T01:28:46.516-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:28:46 [TRACE] terraform.NewContext: complete | |
2021/05/03 01:28:46 [TRACE] backend/local: finished building terraform.Context | |
2021/05/03 01:28:46 [TRACE] backend/local: requesting interactive input, if necessary | |
2021/05/03 01:28:46 [TRACE] Context.Input: Prompting for provider arguments | |
2021/05/03 01:28:46 [TRACE] Context.Input: Provider provider.aws declared at provider.tf:1,1-15 | |
2021/05/03 01:28:46 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{} | |
2021/05/03 01:28:46 [TRACE] backend/local: running validation operation | |
2021/05/03 01:28:46 [INFO] terraform: building graph: GraphTypeValidate | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/05/03 01:28:46 [TRACE] ConfigTransformer: Starting for path: | |
2021/05/03 01:28:46 [TRACE] ConfigTransformer: Starting for path: module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ConfigTransformer: Starting for path: module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/03 01:28:46 [TRACE] OutputTransformer: adding policy_json as *terraform.nodeExpandOutput | |
2021/05/03 01:28:46 [TRACE] OutputTransformer: adding aws_managed_policies as *terraform.nodeExpandOutput | |
2021/05/03 01:28:46 [TRACE] OutputTransformer: adding permission_set_name as *terraform.nodeExpandOutput | |
2021/05/03 01:28:46 [TRACE] OutputTransformer: adding permission_set_arn as *terraform.nodeExpandOutput | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/05/03 01:28:46 [TRACE] StateTransformer: state is empty, so nothing to do | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/custom_arns_policies.tf", Start:hcl.Pos{Line:10, Column:1, Byte:303}, End:hcl.Pos{Line:10, Column:52, Byte:354}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_permission_set.permission-set" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-2/main.tf:38,1-56 | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:12, Column:1, Byte:232}, End:hcl.Pos{Line:12, Column:71, Byte:302}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-2/main.tf:67,1-77 | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:8, Column:1, Byte:119}, End:hcl.Pos{Line:8, Column:56, Byte:174}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-2/main.tf:45,1-74 | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:21, Column:1, Byte:506}, End:hcl.Pos{Line:21, Column:64, Byte:569}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.data.aws_ssoadmin_instances.okta" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2/main.tf", Start:hcl.Pos{Line:26, Column:1, Byte:721}, End:hcl.Pos{Line:26, Column:37, Byte:757}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/default_allow_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.data.aws_identitystore_group.group" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2/main.tf", Start:hcl.Pos{Line:28, Column:1, Byte:762}, End:hcl.Pos{Line:28, Column:39, Byte:800}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.data.aws_identitystore_group.group | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/main.tf", Start:hcl.Pos{Line:2, Column:1, Byte:36}, End:hcl.Pos{Line:2, Column:53, Byte:88}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/default_deny_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:55, Byte:54}} | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.null_resource.check_valid_account" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-2/validations.tf:5,1-47 | |
2021/05/03 01:28:46 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.null_resource.check_valid_account | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/03 01:28:46 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from provider.tf:1,1-15 | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/03 01:28:46 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/null"], implied first by module.test-provider-2.null_resource.check_valid_account | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.null_resource.check_valid_account uses inherited configuration provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.null_resource.check_valid_account" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.data.aws_identitystore_group.group uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.data.aws_identitystore_group.group" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:46 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/03 01:28:46 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.data.aws_identitystore_group.group | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.null_resource.check_valid_account | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:46 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: Added module.test-provider-2 as *terraform.nodeValidateModule | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.aws_accounts (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.data.aws_identitystore_group.group must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.product_name (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.sre_okta_group (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.buckets_arn (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.okta_groups (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.environment (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.null_resource.check_valid_account must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.dynamo_tables_names (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.buckets_names (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.okta_groups (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.sso_role_name (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.output.permission_set_name (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.output.permission_set_arn (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.shared_policies (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.aws_account_alias (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.lambdas_names (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.dynamo_tables_arn (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.custom_policy_json (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.validate_account (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2 (close) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.lambdas_arn (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.allowed_resources (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.aws_account (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: Added module.test-provider-2.module.role-policies as *terraform.nodeValidateModule | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies (expand) must wait for expansion of module.test-provider-2 (expand) | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.var.custom_arns (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.var.role_name (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.shared_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies (close) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.var.custom_policy_json (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.bucket_objects (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.all_arns (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.var.shared_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.output.policy_json (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer with new graph: | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" references: [module.test-provider-2.module.role-policies.local.all_arns (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2 (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" references: [module.test-provider-2.aws_ssoadmin_permission_set.permission-set module.test-provider-2.module.role-policies.output.policy_json (expand) module.test-provider-2.aws_ssoadmin_permission_set.permission-set] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.var.custom_policy_json (expand)" references: [module.test-provider-2.var.custom_policy_json (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.okta_groups (expand)" references: [module.test-provider-2.var.okta_groups (expand) module.test-provider-2.local.sre_okta_group (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.output.permission_set_name (expand)" references: [module.test-provider-2.local.sso_role_name (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies (close)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" references: [module.test-provider-2.module.role-policies.local.shared_policies (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.lambdas_names (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.dynamo_tables_arn (expand)" references: [module.test-provider-2.var.dynamo_tables_names (expand) module.test-provider-2.local.aws_account (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.bucket_objects (expand)" references: [module.test-provider-2.module.role-policies.var.custom_arns (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.var.shared_policies (expand)" references: [module.test-provider-2.var.shared_policies (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.custom_policy_json (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.validate_account (expand)" references: [module.test-provider-2.local.aws_accounts (expand) module.test-provider-2.var.aws_account_alias (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.all_arns (expand)" references: [module.test-provider-2.module.role-policies.local.bucket_objects (expand) module.test-provider-2.module.role-policies.var.custom_arns (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2 (close)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.lambdas_arn (expand)" references: [module.test-provider-2.var.lambdas_names (expand) module.test-provider-2.local.aws_account (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.output.policy_json (expand)" references: [module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.aws_accounts (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)" references: [module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)" references: [module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless] | |
2021/05/03 01:28:46 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.data.aws_identitystore_group.group" references: [module.test-provider-2.local.okta_groups (expand) module.test-provider-2.data.aws_ssoadmin_instances.okta module.test-provider-2.local.okta_groups (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.product_name (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.buckets_arn (expand)" references: [module.test-provider-2.var.buckets_names (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/null\"]" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.null_resource.check_valid_account" references: [module.test-provider-2.local.validate_account (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.okta_groups (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.environment (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.dynamo_tables_names (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set" references: [module.test-provider-2.var.environment (expand) module.test-provider-2.var.product_name (expand) module.test-provider-2.local.sso_role_name (expand) module.test-provider-2.data.aws_ssoadmin_instances.okta] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.buckets_names (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.sso_role_name (expand)" references: [module.test-provider-2.var.product_name (expand) module.test-provider-2.var.environment (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.output.permission_set_arn (expand)" references: [module.test-provider-2.aws_ssoadmin_permission_set.permission-set] | |
2021/05/03 01:28:46 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account" references: [module.test-provider-2.local.okta_groups (expand) module.test-provider-2.aws_ssoadmin_permission_set.permission-set module.test-provider-2.data.aws_identitystore_group.group module.test-provider-2.local.aws_account (expand) module.test-provider-2.aws_ssoadmin_permission_set.permission-set] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.shared_policies (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.aws_account_alias (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.var.custom_arns (expand)" references: [module.test-provider-2.local.allowed_resources (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.allowed_resources (expand)" references: [module.test-provider-2.local.buckets_arn (expand) module.test-provider-2.local.lambdas_arn (expand) module.test-provider-2.local.dynamo_tables_arn (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.aws_account (expand)" references: [module.test-provider-2.local.aws_accounts (expand) module.test-provider-2.var.aws_account_alias (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand)" references: [module.test-provider-2.module.role-policies.var.custom_arns (expand) module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies" references: [module.test-provider-2.module.role-policies.var.role_name (expand)] | |
2021/05/03 01:28:46 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies" references: [module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) module.test-provider-2.aws_ssoadmin_permission_set.permission-set module.test-provider-2.aws_ssoadmin_permission_set.permission-set] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies" references: [module.test-provider-2.module.role-policies.var.custom_policy_json (expand) module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.var.role_name (expand)" references: [module.test-provider-2.local.sso_role_name (expand)] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.sre_okta_group (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies (expand)" references: [] | |
2021/05/03 01:28:46 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.shared_policies (expand)" references: [module.test-provider-2.module.role-policies.var.shared_policies (expand) module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)] | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.attachDataResourceDependenciesTransformer | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta depends on [] | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies depends on [] | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies depends on [] | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy depends on [] | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies depends on [] | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless depends on [] | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.data.aws_identitystore_group.group depends on [] | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies depends on [] | |
2021/05/03 01:28:46 [TRACE] attachDataDependenciesTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion depends on [] | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.attachDataResourceDependenciesTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:28:46 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/03 01:28:46 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:28:46 [DEBUG] Starting graph walk: walkValidate | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2 (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2 (expand)": starting visit (*terraform.nodeValidateModule) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2 (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.environment (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.environment (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.shared_policies (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.shared_policies (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.shared_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.shared_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.environment (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.environment (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.shared_policies" | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.sre_okta_group (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sre_okta_group (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sre_okta_group (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.sre_okta_group as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sre_okta_group (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.sre_okta_group" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sre_okta_group": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.shared_policies": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sre_okta_group": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sre_okta_group (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sre_okta_group (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.custom_policy_json (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.custom_policy_json (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.custom_policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.custom_policy_json (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.custom_policy_json" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.custom_policy_json": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.var.custom_policy_json, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.custom_policy_json": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.custom_policy_json (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.custom_policy_json (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies (expand)": starting visit (*terraform.nodeValidateModule) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.var.shared_policies, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.shared_policies": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/null\"]" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.shared_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.shared_policies (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.environment" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.environment": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-05-03T01:28:46.555-0300 [INFO] plugin: configuring client automatic mTLS | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.environment": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.environment (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.environment (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.var.shared_policies (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.shared_policies (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.shared_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.shared_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.var.shared_policies" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.shared_policies": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.module.role-policies.var.shared_policies, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.shared_policies": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.shared_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.shared_policies (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.var.custom_policy_json (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_policy_json (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_policy_json (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.var.custom_policy_json" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_policy_json": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.module.role-policies.var.custom_policy_json, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_policy_json": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_policy_json (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_policy_json (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.lambdas_names (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.lambdas_names (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.lambdas_names (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.lambdas_names (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.lambdas_names" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.lambdas_names": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.var.lambdas_names, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.lambdas_names": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.lambdas_names (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.lambdas_names (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.dynamo_tables_names (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.dynamo_tables_names (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.dynamo_tables_names (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.dynamo_tables_names (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.dynamo_tables_names" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.dynamo_tables_names": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.var.dynamo_tables_names, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.dynamo_tables_names": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.dynamo_tables_names (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.dynamo_tables_names (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.product_name (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.product_name (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.product_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.product_name (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.product_name" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.product_name": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.var.product_name, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.product_name": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.product_name (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.product_name (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.sso_role_name (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sso_role_name (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sso_role_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.sso_role_name as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sso_role_name (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.sso_role_name" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sso_role_name": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sso_role_name": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sso_role_name (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.sso_role_name (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.aws_account_alias (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.aws_account_alias (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.aws_account_alias (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.aws_account_alias (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.aws_account_alias" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.aws_account_alias": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.aws_account_alias": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.aws_account_alias (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.aws_account_alias (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.module.role-policies.local.aws_managed_policies as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.aws_managed_policies" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.aws_managed_policies": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.aws_managed_policies": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding output: adding module.test-provider-2.module.role-policies.output.aws_managed_policies as *terraform.NodeApplyableOutput | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.output.aws_managed_policies" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/03 01:28:46 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-2.module.role-policies.output.aws_managed_policies in changeset | |
2021/05/03 01:28:46 [TRACE] EvalWriteOutput: Saving value for module.test-provider-2.module.role-policies.output.aws_managed_policies in state | |
2021/05/03 01:28:46 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-2.module.role-policies.output.aws_managed_policies in changeset | |
2021/05/03 01:28:46 [TRACE] EvalWriteOutput: Saving value for module.test-provider-2.module.role-policies.output.aws_managed_policies in state | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.okta_groups (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.okta_groups (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.okta_groups (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.okta_groups (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.okta_groups" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.okta_groups": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.var.okta_groups, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.okta_groups": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.okta_groups (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.okta_groups (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.okta_groups (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.okta_groups (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.okta_groups (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.okta_groups as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.okta_groups (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.okta_groups" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.okta_groups": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.okta_groups": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.okta_groups (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.okta_groups (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.buckets_names (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.buckets_names (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.buckets_names (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.buckets_names (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.var.buckets_names" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.buckets_names": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.var.buckets_names, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.buckets_names": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.buckets_names (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.var.buckets_names (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.buckets_arn (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.buckets_arn (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.buckets_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.buckets_arn as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.buckets_arn (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.buckets_arn" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.buckets_arn": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.buckets_arn": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.buckets_arn (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.buckets_arn (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.aws_accounts (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_accounts (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_accounts (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.aws_accounts as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_accounts (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.aws_accounts" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_accounts": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_accounts": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_accounts (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_accounts (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.aws_account (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_account (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_account (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.aws_account as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_account (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.aws_account" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_account": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_account": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_account (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.aws_account (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.dynamo_tables_arn (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.dynamo_tables_arn (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.dynamo_tables_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.dynamo_tables_arn as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.dynamo_tables_arn (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.dynamo_tables_arn" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.dynamo_tables_arn": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.dynamo_tables_arn": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.dynamo_tables_arn (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.dynamo_tables_arn (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.var.role_name (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.role_name (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.role_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.role_name (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.var.role_name" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.role_name": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.module.role-policies.var.role_name, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.role_name": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.role_name (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.role_name (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.validate_account (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.validate_account (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.validate_account (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.validate_account as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.validate_account (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.validate_account" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.validate_account": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.validate_account": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.validate_account (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.validate_account (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.lambdas_arn (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.lambdas_arn (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.lambdas_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.lambdas_arn as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.lambdas_arn (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.lambdas_arn" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.lambdas_arn": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.lambdas_arn": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.lambdas_arn (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.lambdas_arn (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.allowed_resources (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.allowed_resources (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.allowed_resources (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.local.allowed_resources as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.allowed_resources (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.local.allowed_resources" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.allowed_resources": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.allowed_resources": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.allowed_resources (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.local.allowed_resources (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.var.custom_arns (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_arns (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_arns (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_arns (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.var.custom_arns" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_arns": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:28:46 [TRACE] evalVariableValidations: not active for module.test-provider-2.module.role-policies.var.custom_arns, so skipping | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_arns": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_arns (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.var.custom_arns (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.bucket_objects (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.bucket_objects (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.bucket_objects (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.module.role-policies.local.bucket_objects as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.bucket_objects (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.bucket_objects" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.bucket_objects": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.bucket_objects": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.bucket_objects (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.bucket_objects (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.all_arns (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.all_arns (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.all_arns (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding local: adding module.test-provider-2.module.role-policies.local.all_arns as *terraform.NodeLocal | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.all_arns (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.all_arns" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.all_arns": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.all_arns": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.all_arns (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.module.role-policies.local.all_arns (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.output.permission_set_name (expand)" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] Expanding output: adding module.test-provider-2.output.permission_set_name as *terraform.NodeApplyableOutput | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": entering dynamic subgraph | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.output.permission_set_name" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.output.permission_set_name": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/03 01:28:46 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-2.output.permission_set_name in changeset | |
2021/05/03 01:28:46 [TRACE] EvalWriteOutput: Removing module.test-provider-2.output.permission_set_name from state (it is now null) | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.output.permission_set_name": visit complete | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:28:46 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-05-03T01:28:46.687-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5] | |
2021-05-03T01:28:46.699-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30236 | |
2021-05-03T01:28:46.700-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 | |
2021-05-03T01:28:46.716-0300 [INFO] plugin.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:28:46.711-0300 | |
2021-05-03T01:28:46.801-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:28:46.802-0300 [DEBUG] plugin.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin742256099 network=unix timestamp=2021-05-03T01:28:46.801-0300 | |
2021/05/03 01:28:46 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/null\"]" provider for provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:28:46 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/null"]: no configuration at all | |
2021/05/03 01:28:46 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:28:46.988-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021-05-03T01:28:46.988-0300 [INFO] plugin: configuring client automatic mTLS | |
2021/05/03 01:28:46 [TRACE] GRPCProvider: PrepareProviderConfig | |
2021/05/03 01:28:46 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"]": visit complete | |
2021/05/03 01:28:46 [TRACE] dag/walk: visiting "module.test-provider-2.null_resource.check_valid_account" | |
2021/05/03 01:28:46 [TRACE] vertex "module.test-provider-2.null_resource.check_valid_account": starting visit (*terraform.NodeValidatableResource) | |
2021-05-03T01:28:47.051-0300 [DEBUG] plugin: starting plugin: path=/Users/jvitor/golang/bin/terraform-provider-aws args=[/Users/jvitor/golang/bin/terraform-provider-aws] | |
2021-05-03T01:28:47.059-0300 [DEBUG] plugin: plugin started: path=/Users/jvitor/golang/bin/terraform-provider-aws pid=30239 | |
2021-05-03T01:28:47.059-0300 [DEBUG] plugin: waiting for RPC address: path=/Users/jvitor/golang/bin/terraform-provider-aws | |
2021-05-03T01:28:47.136-0300 [INFO] plugin.terraform-provider-aws: configuring server automatic mTLS: timestamp=2021-05-03T01:28:47.135-0300 | |
2021-05-03T01:28:47.257-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:28:47.257-0300 [DEBUG] plugin.terraform-provider-aws: plugin address: network=unix address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin881972930 timestamp=2021-05-03T01:28:47.257-0300 | |
2021/05/03 01:28:47 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:47 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021/05/03 01:28:47 [TRACE] GRPCProvider: GetSchema | |
2021/05/03 01:28:47 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021-05-03T01:28:47.472-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:28:47 [TRACE] vertex "module.test-provider-2.null_resource.check_valid_account": visit complete | |
2021/05/03 01:28:47 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/null\"] (close)" | |
2021/05/03 01:28:47 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:28:47 [TRACE] GRPCProvider: Close | |
2021-05-03T01:28:47.475-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:28:47.477-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30236 | |
2021-05-03T01:28:47.477-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:28:47 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"] (close)": visit complete | |
2021/05/03 01:28:47 [TRACE] GRPCProvider: PrepareProviderConfig | |
2021/05/03 01:28:48 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.data.aws_ssoadmin_instances.okta" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021-05-03T01:28:48.243-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:48 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:28:48.242-0300 | |
2021-05-03T01:28:48.243-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:48 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:28:48.243-0300 | |
2021-05-03T01:28:48.244-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:48 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:28:48.244-0300 | |
2021-05-03T01:28:48.244-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:48 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:28:48.244-0300 | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] Expanding local: adding module.test-provider-2.module.role-policies.local.shared_policies_struct as *terraform.NodeLocal | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)": entering dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.shared_policies_struct" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies_struct": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_permission_set.permission-set" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies_struct": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.shared_policies (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] Expanding local: adding module.test-provider-2.module.role-policies.local.shared_policies as *terraform.NodeLocal | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.shared_policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.shared_policies (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.data.aws_identitystore_group.group" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.data.aws_identitystore_group.group": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy": visit complete | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] Expanding local: adding module.test-provider-2.module.role-policies.local.custom_arn_policy_json as *terraform.NodeLocal | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand)": entering dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.local.custom_arn_policy_json" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.custom_arn_policy_json": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.custom_arn_policy_json": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.data.aws_identitystore_group.group": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.output.permission_set_arn (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] Expanding output: adding module.test-provider-2.output.permission_set_arn as *terraform.NodeApplyableOutput | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": entering dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.output.permission_set_arn" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-2.output.permission_set_arn in changeset | |
2021/05/03 01:28:48 [TRACE] EvalWriteOutput: Removing module.test-provider-2.output.permission_set_arn from state (it is now null) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account": visit complete | |
2021-05-03T01:28:48.251-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:48 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:28:48.250-0300 | |
2021-05-03T01:28:48.251-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:48 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:28:48.250-0300 | |
2021-05-03T01:28:48.251-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:48 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:28:48.251-0300 | |
2021-05-03T01:28:48.251-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:48 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:28:48.251-0300 | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.output.policy_json (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] Expanding output: adding module.test-provider-2.module.role-policies.output.policy_json as *terraform.NodeApplyableOutput | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": entering dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.output.policy_json" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/03 01:28:48 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-2.module.role-policies.output.policy_json in changeset | |
2021/05/03 01:28:48 [TRACE] EvalWriteOutput: Removing module.test-provider-2.module.role-policies.output.policy_json from state (it is now null) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies (close)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies (close)": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies (close)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2 (close)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2 (close)": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2 (close)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:28:48 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021/05/03 01:28:48 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: Close | |
2021/05/03 01:28:48 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-05-03T01:28:48.256-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:28:48.264-0300 [DEBUG] plugin: plugin process exited: path=/Users/jvitor/golang/bin/terraform-provider-aws pid=30239 | |
2021-05-03T01:28:48.264-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:28:48 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "root" | |
2021/05/03 01:28:48 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:28:48 [TRACE] vertex "root": visit complete | |
2021/05/03 01:28:48 [INFO] backend/local: apply calling Plan | |
2021/05/03 01:28:48 [INFO] terraform: building graph: GraphTypePlanDestroy | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/05/03 01:28:48 [TRACE] StateTransformer: creating nodes for both current and deposed instance objects | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_permission_set.permission-set current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.data.aws_identitystore_group.group[0] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.data.aws_ssoadmin_instances.okta current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies current object | |
2021/05/03 01:28:48 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies current object | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.StateTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
------ | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/03 01:28:48 [TRACE] OutputTransformer: adding policy_json as *terraform.nodeExpandOutput | |
2021/05/03 01:28:48 [TRACE] OutputTransformer: adding aws_managed_policies as *terraform.nodeExpandOutput | |
2021/05/03 01:28:48 [TRACE] OutputTransformer: adding permission_set_name as *terraform.nodeExpandOutput | |
2021/05/03 01:28:48 [TRACE] OutputTransformer: adding permission_set_arn as *terraform.nodeExpandOutput | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
------ | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/default_deny_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:55, Byte:54}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_permission_set.permission-set" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:38,1-56 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/custom_arns_policies.tf", Start:hcl.Pos{Line:10, Column:1, Byte:303}, End:hcl.Pos{Line:10, Column:52, Byte:354}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/default_allow_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/main.tf", Start:hcl.Pos{Line:2, Column:1, Byte:36}, End:hcl.Pos{Line:2, Column:53, Byte:88}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.data.aws_identitystore_group.group[0]" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2/main.tf", Start:hcl.Pos{Line:28, Column:1, Byte:762}, End:hcl.Pos{Line:28, Column:39, Byte:800}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.data.aws_ssoadmin_instances.okta" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2/main.tf", Start:hcl.Pos{Line:26, Column:1, Byte:721}, End:hcl.Pos{Line:26, Column:37, Byte:757}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:45,1-74 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:21, Column:1, Byte:506}, End:hcl.Pos{Line:21, Column:64, Byte:569}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-2/main.tf:67,1-77 | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:12, Column:1, Byte:232}, End:hcl.Pos{Line:12, Column:71, Byte:302}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:8, Column:1, Byte:119}, End:hcl.Pos{Line:8, Column:56, Byte:174}} | |
2021/05/03 01:28:48 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/03 01:28:48 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from provider.tf:1,1-15 | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.data.aws_identitystore_group.group[0] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.data.aws_identitystore_group.group[0]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/03 01:28:48 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.data.aws_identitystore_group.group[0]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies has stored dependency of module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_identitystore_group.group[0] has stored dependency of module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:48 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:28:48 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/03 01:28:48 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
root - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:28:48 [DEBUG] Starting graph walk: walkPlanDestroy | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.output.policy_json (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": produced no dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.policy_json (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.output.permission_set_name (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": produced no dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_name (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.output.permission_set_arn (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": produced no dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": produced no dynamic subgraph | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.output.permission_set_arn (expand)": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:28:48 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-05-03T01:28:48.278-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:28:48.332-0300 [DEBUG] plugin: starting plugin: path=/Users/jvitor/golang/bin/terraform-provider-aws args=[/Users/jvitor/golang/bin/terraform-provider-aws] | |
2021-05-03T01:28:48.344-0300 [DEBUG] plugin: plugin started: path=/Users/jvitor/golang/bin/terraform-provider-aws pid=30245 | |
2021-05-03T01:28:48.345-0300 [DEBUG] plugin: waiting for RPC address: path=/Users/jvitor/golang/bin/terraform-provider-aws | |
2021-05-03T01:28:48.509-0300 [INFO] plugin.terraform-provider-aws: configuring server automatic mTLS: timestamp=2021-05-03T01:28:48.503-0300 | |
2021-05-03T01:28:48.631-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:28:48.632-0300 [DEBUG] plugin.terraform-provider-aws: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin717289912 network=unix timestamp=2021-05-03T01:28:48.631-0300 | |
2021/05/03 01:28:48 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:48 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:28:48.796-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]" | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:48 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless": visit complete | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:48 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy": visit complete | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:48 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies": visit complete | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:48 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:48 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:48 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies": visit complete | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:48 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion": visit complete | |
2021/05/03 01:28:48 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:48 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:48 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]": visit complete | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "module.test-provider-2.data.aws_identitystore_group.group[0]" | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.data.aws_identitystore_group.group[0]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:49 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.data.aws_identitystore_group.group[0]": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy": visit complete | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_permission_set.permission-set" | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies" | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:49 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:49 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:49 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_permission_set.permission-set is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:49 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies": visit complete | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set": visit complete | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "module.test-provider-2.data.aws_ssoadmin_instances.okta" | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:28:49 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:28:49 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta": visit complete | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021/05/03 01:28:49 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:28:49 [TRACE] GRPCProvider: Close | |
2021-05-03T01:28:49.097-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:28:49.106-0300 [DEBUG] plugin: plugin process exited: path=/Users/jvitor/golang/bin/terraform-provider-aws pid=30245 | |
2021-05-03T01:28:49.106-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:28:49 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "root" | |
2021/05/03 01:28:49 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:28:49 [TRACE] vertex "root": visit complete | |
2021/05/03 01:28:49 [INFO] backend/local: apply calling Apply | |
2021/05/03 01:28:49 [INFO] terraform: building graph: GraphTypeApply | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/05/03 01:28:49 [TRACE] ConfigTransformer: Starting for path: | |
2021/05/03 01:28:49 [TRACE] ConfigTransformer: Starting for path: module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ConfigTransformer: Starting for path: module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/03 01:28:49 [TRACE] OutputTransformer: adding policy_json as *terraform.nodeExpandOutput | |
2021/05/03 01:28:49 [TRACE] OutputTransformer: adding aws_managed_policies as *terraform.nodeExpandOutput | |
2021/05/03 01:28:49 [TRACE] OutputTransformer: adding permission_set_name as *terraform.nodeExpandOutput | |
2021/05/03 01:28:49 [TRACE] OutputTransformer: adding permission_set_arn as *terraform.nodeExpandOutput | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.DiffTransformer | |
2021/05/03 01:28:49 [TRACE] DiffTransformer starting | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless will be represented for destruction by module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy will be represented for destruction by module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies will be represented for destruction by module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies will be represented for destruction by module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion will be represented for destruction by module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies will be represented for destruction by module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] will be represented for destruction by module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] will be represented for destruction by module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] will be represented for destruction by module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] will be represented for destruction by module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] will be represented for destruction by module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] will be represented for destruction by module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] will be represented for destruction by module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] will be represented for destruction by module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.data.aws_identitystore_group.group[0] will be represented for destruction by module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy will be represented for destruction by module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies will be represented for destruction by module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set will be represented for destruction by module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: found Delete change for module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:28:49 [TRACE] DiffTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta will be represented for destruction by module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) | |
2021/05/03 01:28:49 [TRACE] DiffTransformer complete | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.DiffTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:45,1-74 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-2/main.tf:38,1-56 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:12, Column:1, Byte:232}, End:hcl.Pos{Line:12, Column:71, Byte:302}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/default_deny_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:55, Byte:54}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2/main.tf", Start:hcl.Pos{Line:26, Column:1, Byte:721}, End:hcl.Pos{Line:26, Column:37, Byte:757}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/main.tf", Start:hcl.Pos{Line:2, Column:1, Byte:36}, End:hcl.Pos{Line:2, Column:53, Byte:88}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/default_allow_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/main.tf", Start:hcl.Pos{Line:2, Column:1, Byte:36}, End:hcl.Pos{Line:2, Column:53, Byte:88}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:38,1-56 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/custom_arns_policies.tf", Start:hcl.Pos{Line:10, Column:1, Byte:303}, End:hcl.Pos{Line:10, Column:52, Byte:354}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:8, Column:1, Byte:119}, End:hcl.Pos{Line:8, Column:56, Byte:174}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:12, Column:1, Byte:232}, End:hcl.Pos{Line:12, Column:71, Byte:302}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.null_resource.check_valid_account (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-2/validations.tf:5,1-47 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.null_resource.check_valid_account (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-2/main.tf:45,1-74 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-2/main.tf:67,1-77 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:8, Column:1, Byte:119}, End:hcl.Pos{Line:8, Column:56, Byte:174}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/default_allow_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:21, Column:1, Byte:506}, End:hcl.Pos{Line:21, Column:64, Byte:569}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/default_deny_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:55, Byte:54}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.data.aws_ssoadmin_instances.okta (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2/main.tf", Start:hcl.Pos{Line:26, Column:1, Byte:721}, End:hcl.Pos{Line:26, Column:37, Byte:757}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:21, Column:1, Byte:506}, End:hcl.Pos{Line:21, Column:64, Byte:569}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:73,1-69 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-2/main.tf:67,1-77 | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-2/main.tf", Start:hcl.Pos{Line:28, Column:1, Byte:762}, End:hcl.Pos{Line:28, Column:39, Byte:800}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.data.aws_identitystore_group.group (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2/main.tf", Start:hcl.Pos{Line:28, Column:1, Byte:762}, End:hcl.Pos{Line:28, Column:39, Byte:800}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.data.aws_identitystore_group.group (expand) | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-2.role-policies/custom_arns_policies.tf", Start:hcl.Pos{Line:10, Column:1, Byte:303}, End:hcl.Pos{Line:10, Column:52, Byte:354}} | |
2021/05/03 01:28:49 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/03 01:28:49 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from provider.tf:1,1-15 | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/03 01:28:49 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/null"], implied first by module.test-provider-2.null_resource.check_valid_account (expand) | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.data.aws_identitystore_group.group (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.data.aws_identitystore_group.group (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.null_resource.check_valid_account (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.null_resource.check_valid_account (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: looking for module.test-provider-2.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] ProviderTransformer: module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [DEBUG] ProviderTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/03 01:28:49 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.data.aws_identitystore_group.group (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.null_resource.check_valid_account (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:28:49 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: Added module.test-provider-2 as *terraform.nodeExpandModule | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.environment (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.aws_account (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.custom_policy_json (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.buckets_names (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.null_resource.check_valid_account (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.validate_account (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.sso_role_name (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.sre_okta_group (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.lambdas_arn (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.buckets_arn (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.aws_accounts (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2 (close) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.dynamo_tables_names (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.allowed_resources (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.lambdas_names (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.shared_policies (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.okta_groups (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.data.aws_identitystore_group.group (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.okta_groups (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.product_name (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.var.aws_account_alias (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.local.dynamo_tables_arn (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.output.permission_set_name (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.output.permission_set_arn (expand) must wait for expansion of module.test-provider-2 | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: Added module.test-provider-2.module.role-policies as *terraform.nodeExpandModule | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies (expand) must wait for expansion of module.test-provider-2 (expand) | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.var.role_name (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.output.policy_json (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.var.shared_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.var.custom_policy_json (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.var.custom_arns (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.all_arns (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies (close) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.shared_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.bucket_objects (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] ModuleExpansionTransformer: module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) must wait for expansion of module.test-provider-2.module.role-policies | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer with new graph: | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.var.custom_arns (expand)" references: [module.test-provider-2.local.allowed_resources (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.lambdas_names (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.shared_policies (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.okta_groups (expand)" references: [module.test-provider-2.var.okta_groups (expand) module.test-provider-2.local.sre_okta_group (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.data.aws_identitystore_group.group (expand)" references: [module.test-provider-2.local.okta_groups (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand)" references: [module.test-provider-2.module.role-policies.var.custom_arns (expand) module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.all_arns (expand)" references: [module.test-provider-2.module.role-policies.local.bucket_objects (expand) module.test-provider-2.module.role-policies.var.custom_arns (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.okta_groups (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.product_name (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies (close)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.aws_account_alias (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.dynamo_tables_arn (expand)" references: [module.test-provider-2.var.dynamo_tables_names (expand) module.test-provider-2.local.aws_account (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.shared_policies (expand)" references: [module.test-provider-2.module.role-policies.var.shared_policies (expand) module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.output.permission_set_name (expand)" references: [module.test-provider-2.local.sso_role_name (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.output.permission_set_arn (expand)" references: [module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.bucket_objects (expand)" references: [module.test-provider-2.module.role-policies.var.custom_arns (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.shared_policies_struct (expand)" references: [module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.var.role_name (expand)" references: [module.test-provider-2.local.sso_role_name (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.environment (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.aws_account (expand)" references: [module.test-provider-2.local.aws_accounts (expand) module.test-provider-2.var.aws_account_alias (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.output.policy_json (expand)" references: [module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)" references: [module.test-provider-2.module.role-policies.local.aws_managed_policies (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand)" references: [module.test-provider-2.module.role-policies.output.aws_managed_policies (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.custom_policy_json (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.buckets_names (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.null_resource.check_valid_account (expand)" references: [module.test-provider-2.local.validate_account (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.validate_account (expand)" references: [module.test-provider-2.local.aws_accounts (expand) module.test-provider-2.var.aws_account_alias (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.sso_role_name (expand)" references: [module.test-provider-2.var.product_name (expand) module.test-provider-2.var.environment (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.sre_okta_group (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.lambdas_arn (expand)" references: [module.test-provider-2.var.lambdas_names (expand) module.test-provider-2.local.aws_account (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/null\"]" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand)" references: [module.test-provider-2.local.okta_groups (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.var.shared_policies (expand)" references: [module.test-provider-2.var.shared_policies (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.buckets_arn (expand)" references: [module.test-provider-2.var.buckets_names (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.aws_accounts (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2 (close)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.var.dynamo_tables_names (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.local.allowed_resources (expand)" references: [module.test-provider-2.local.buckets_arn (expand) module.test-provider-2.local.lambdas_arn (expand) module.test-provider-2.local.dynamo_tables_arn (expand)] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2 (expand)" references: [] | |
2021/05/03 01:28:49 [DEBUG] ReferenceTransformer: "module.test-provider-2.module.role-policies.var.custom_policy_json (expand)" references: [module.test-provider-2.var.custom_policy_json (expand)] | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] ForcedCBDTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:28:49 [TRACE] DestroyEdgeTransformer: module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer with new graph: | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-2.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-2.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
module.test-provider-2.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-2 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.CBDEdgeTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.CBDEdgeTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.pruneUnusedNodesTransformer | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.null_resource.check_valid_account (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.var.custom_policy_json (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.data.aws_ssoadmin_instances.okta (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.local.custom_arn_policy_json (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.local.all_arns (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.data.aws_identitystore_group.group (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.local.shared_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.output.permission_set_name (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.output.permission_set_arn (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.local.bucket_objects (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.local.shared_policies_struct (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.custom_policy_json (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.output.policy_json (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.validate_account (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.var.shared_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.output.aws_managed_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.var.custom_arns (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.shared_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.okta_groups (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.okta_groups (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.aws_ssoadmin_permission_set.permission-set (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.sre_okta_group (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.var.role_name (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.allowed_resources (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies.local.aws_managed_policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.sso_role_name (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.dynamo_tables_arn (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.lambdas_arn (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.module.role-policies (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.buckets_arn (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.environment (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.aws_account (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.dynamo_tables_names (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.aws_account_alias (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.buckets_names (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.product_name (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.local.aws_accounts (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2.var.lambdas_names (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [DEBUG] pruneUnusedNodes: module.test-provider-2 (expand) is no longer needed, removing | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.pruneUnusedNodesTransformer with new graph: | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:28:49 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/03 01:28:49 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-2 (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-2.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:28:49 [DEBUG] Starting graph walk: walkDestroy | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/null\"]" | |
2021/05/03 01:28:49 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies (close)" | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.module.role-policies (close)": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2.module.role-policies (close)": visit complete | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "module.test-provider-2 (close)" | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2 (close)": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:28:49 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:28:49 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021/05/03 01:28:49 [TRACE] vertex "module.test-provider-2 (close)": visit complete | |
2021-05-03T01:28:49.203-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:28:49.326-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5] | |
2021-05-03T01:28:49.340-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30250 | |
2021-05-03T01:28:49.341-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 | |
2021-05-03T01:28:49.350-0300 [INFO] plugin.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:28:49.350-0300 | |
2021-05-03T01:28:49.429-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:28:49.430-0300 [DEBUG] plugin.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin219472497 network=unix timestamp=2021-05-03T01:28:49.429-0300 | |
2021/05/03 01:28:49 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/null\"]" provider for provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:28:49 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/null"]: no configuration at all | |
2021/05/03 01:28:49 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:28:49.581-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:28:49.590-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021-05-03T01:28:49.667-0300 [DEBUG] plugin: starting plugin: path=/Users/jvitor/golang/bin/terraform-provider-aws args=[/Users/jvitor/golang/bin/terraform-provider-aws] | |
2021-05-03T01:28:49.701-0300 [DEBUG] plugin: plugin started: path=/Users/jvitor/golang/bin/terraform-provider-aws pid=30252 | |
2021-05-03T01:28:49.702-0300 [DEBUG] plugin: waiting for RPC address: path=/Users/jvitor/golang/bin/terraform-provider-aws | |
2021-05-03T01:28:49.825-0300 [INFO] plugin.terraform-provider-aws: configuring server automatic mTLS: timestamp=2021-05-03T01:28:49.824-0300 | |
2021-05-03T01:28:49.977-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:28:49.977-0300 [DEBUG] plugin.terraform-provider-aws: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin921836179 network=unix timestamp=2021-05-03T01:28:49.976-0300 | |
2021/05/03 01:28:50 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:28:50 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021/05/03 01:28:50 [TRACE] GRPCProvider: GetSchema | |
2021/05/03 01:28:50 [TRACE] GRPCProvider: Configure | |
2021-05-03T01:28:50.072-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:28:50 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"]": visit complete | |
2021/05/03 01:28:50 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/null\"] (close)" | |
2021/05/03 01:28:50 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:28:50 [TRACE] GRPCProvider: Close | |
2021-05-03T01:28:50.075-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:28:50.078-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30250 | |
2021-05-03T01:28:50.078-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:28:50 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"] (close)": visit complete | |
2021/05/03 01:28:50 [TRACE] GRPCProvider: Configure | |
2021-05-03T01:28:50.251-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:50 [INFO] Attempting to use session-derived credentials: timestamp=2021-05-03T01:28:50.246-0300 | |
2021-05-03T01:28:51.334-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:51 [INFO] Successfully derived credentials from session: timestamp=2021-05-03T01:28:51.334-0300 | |
2021-05-03T01:28:51.334-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:51 [INFO] AWS Auth provider used: "SSOProvider": timestamp=2021-05-03T01:28:51.334-0300 | |
2021-05-03T01:28:51.334-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:51 [DEBUG] Trying to get account information via sts:GetCallerIdentity: timestamp=2021-05-03T01:28:51.334-0300 | |
2021-05-03T01:28:51.335-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:51 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sts.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 43 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=6ca38e7597f77babef186db4eb8d016727d6b7d58a1237178d62e120e52b18a8 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210503T042851Z | |
X-Amz-Security-Token: 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 | |
Accept-Encoding: gzip | |
Action=GetCallerIdentity&Version=2011-06-15 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:51.335-0300 | |
2021-05-03T01:28:51.991-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:51 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 510 | |
Content-Type: text/xml | |
Date: Mon, 03 May 2021 04:28:51 GMT | |
X-Amzn-Requestid: 130d7533-3b54-4a1f-ae41-4ed4fbcfae9d | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:51.991-0300 | |
2021-05-03T01:28:51.991-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:51 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
<GetCallerIdentityResult> | |
<Arn>arn:aws:sts::797740695898:assumed-role/AWSReservedSSO_1-sre-admin_542df63bbfb998fa/[email protected]</Arn> | |
<UserId>AROA3TPINAFNERIQUXSEL:[email protected]</UserId> | |
<Account>797740695898</Account> | |
</GetCallerIdentityResult> | |
<ResponseMetadata> | |
<RequestId>130d7533-3b54-4a1f-ae41-4ed4fbcfae9d</RequestId> | |
</ResponseMetadata> | |
</GetCallerIdentityResponse>: timestamp=2021-05-03T01:28:51.991-0300 | |
2021-05-03T01:28:51.991-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:51 [DEBUG] Trying to get account information via sts:GetCallerIdentity: timestamp=2021-05-03T01:28:51.991-0300 | |
2021-05-03T01:28:51.992-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:51 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sts.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 43 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=6ca38e7597f77babef186db4eb8d016727d6b7d58a1237178d62e120e52b18a8 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210503T042851Z | |
X-Amz-Security-Token: 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 | |
Accept-Encoding: gzip | |
Action=GetCallerIdentity&Version=2011-06-15 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:51.992-0300 | |
2021-05-03T01:28:52.677-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:52 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 510 | |
Content-Type: text/xml | |
Date: Mon, 03 May 2021 04:28:52 GMT | |
X-Amzn-Requestid: b134f26c-324a-411a-9aa8-eeea038bf765 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:52.677-0300 | |
2021-05-03T01:28:52.677-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:52 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
<GetCallerIdentityResult> | |
<Arn>arn:aws:sts::797740695898:assumed-role/AWSReservedSSO_1-sre-admin_542df63bbfb998fa/[email protected]</Arn> | |
<UserId>AROA3TPINAFNERIQUXSEL:[email protected]</UserId> | |
<Account>797740695898</Account> | |
</GetCallerIdentityResult> | |
<ResponseMetadata> | |
<RequestId>b134f26c-324a-411a-9aa8-eeea038bf765</RequestId> | |
</ResponseMetadata> | |
</GetCallerIdentityResponse>: timestamp=2021-05-03T01:28:52.677-0300 | |
2021-05-03T01:28:52.681-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:52 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: ec2.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 87 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=9089d74a79e741abde11f9d317011e56c2c7d539f3626564c4499e62e672e7d3 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210503T042852Z | |
X-Amz-Security-Token: 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 | |
Accept-Encoding: gzip | |
Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:52.680-0300 | |
2021-05-03T01:28:53.407-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 644 | |
Cache-Control: no-cache, no-store | |
Content-Type: text/xml;charset=UTF-8 | |
Date: Mon, 03 May 2021 04:28:52 GMT | |
Server: AmazonEC2 | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
X-Amzn-Requestid: 2bc5180d-ad57-4ee9-85c2-4a46b20168f4 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.407-0300 | |
2021-05-03T01:28:53.408-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
<DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
<requestId>2bc5180d-ad57-4ee9-85c2-4a46b20168f4</requestId> | |
<accountAttributeSet> | |
<item> | |
<attributeName>supported-platforms</attributeName> | |
<attributeValueSet> | |
<item> | |
<attributeValue>EC2</attributeValue> | |
</item> | |
<item> | |
<attributeValue>VPC</attributeValue> | |
</item> | |
</attributeValueSet> | |
</item> | |
</accountAttributeSet> | |
</DescribeAccountAttributesResponse>: timestamp=2021-05-03T01:28:53.407-0300 | |
2021/05/03 01:28:53 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: creating backup snapshot at terraform.tfstate.backup | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 373 | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)": visit complete | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:28:53 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:28:53 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:28:53 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 374 | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]: Destroying... [id=arn:aws:iam::aws:policy/AmazonVPCReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]: Destroying... [id=arn:aws:iam::aws:policy/AmazonRoute53ReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]: Destroying... [id=arn:aws:iam::aws:policy/job-function/SupportUser,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]: Destroying... [id=arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]: Destroying... [id=arn:aws:iam::aws:policy/AWSCertificateManagerReadOnly,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021-05-03T01:28:53.444-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-03T01:28:53.444-0300 | |
2021-05-03T01:28:53.444-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-03T01:28:53.444-0300 | |
2021-05-03T01:28:53.446-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-03T01:28:53.444-0300 | |
2021-05-03T01:28:53.446-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-03T01:28:53.444-0300 | |
2021-05-03T01:28:53.446-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-03T01:28:53.445-0300 | |
2021-05-03T01:28:53.446-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 230 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=c97fea31c441cc8b905c5118dd12b4977ddb2242328f2f0252293452d0c22307 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AmazonRoute53ReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.445-0300 | |
2021-05-03T01:28:53.446-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 232 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=9bb634b54c75a6db2b077db5b997722efeabe58d84d8bde1fcc912a7b154531a | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AWSCertificateManagerReadOnly","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.445-0300 | |
2021-05-03T01:28:53.446-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 227 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=245a581bcb477991c1bfc89c450726e442b26c2681942f2508d4cd4c51ee5573 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: IQoJb3JpZ2luX2VjEFUaCXVzLWVhc3QtMSJHMEUCIFjq1qK2BPB+cT27kb9q0zqnmr5VNyQEA//q7OpdqAnFAiEA2t/cFWJhKw1sy7Hre14Y6dv3shgNfqBmI7dfq0GboqwqrwMIzv//////////ARAAGgw3OTc3NDA2OTU4OTgiDHaV2HPOqN3OfxGsZCqDAxiKLR1NLv4wj5VE6eD+WjvSIi7sF19/rtCYWgDdL+lauWAIfYhl3jfQoSGnLKypupqkK9l/+lIusoh3gGaFjDvz9NSAZOdE/xq4nArTYYg4flL/yylOUdlWviAmKbLIPS0IaujfpG2J04KZ1N3/IxL3N1DH9k4mIrxHhx5kSxY6NSHbfqu1Add09RWgX0E95zZgIbLZoSM6j1rTajVhNNvAQQfZStz3pJj/+DZkRvR5LuiaY/QaRi+1eKZ6B/3/S/Z4oOZQMckIMwQjvRGtSMLvFcxyNjCSvChMAsWq6ClQ0nIi8m2zDXBixXe3EHMjsF/NwCtZs7r7cne01I6TsGLv/tDV10yGJcWHHKul6seum7R1L31lNKrHGVveHAmbPaFs6flE6ihdK8Wlu/CltR1AIgDSn5aAlmP8QceuxysAuXfkYrDSua1PjutwlmlCitxS4cbsK/feocC9obfEMtmvfvk4qw1j4qg2TlLbojDxz7OFe6w+G5pKAI4svBkeJDNgGTCD+L2EBjqmAaP2B5Egn9Z01IQlgb3mFauHRw3uYrAjDL6z7RbXoaQvXQXPRQ+q5gdduEFUKdRxfzBM/LqtVbGseYk9qGrLX/w82EZPbk+9mwEA72algjopIaddIitLKXKgnfLNhDQFMjTebGlhhh9WVoyyX0NPrug1U9A0GbVR/0gjFMKTohJ8x7tvjaRi78viU+mfPk4+U+fhSAAz2KCy0bwnLFug7NkYbaKR51s= | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/job-function/SupportUser","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.445-0300 | |
2021-05-03T01:28:53.446-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 227 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=b6da2daa83efecf0c6fae2bb86db3c3d338d14c94744540b471162309571ee71 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.445-0300 | |
2021-05-03T01:28:53.447-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 226 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=093df75575d8198775897a9bb01668129809375b3b1d90954fd19467151a201e | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AmazonVPCReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.447-0300 | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)": visit complete | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 375 | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)": visit complete | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]: Destroying... [id=arn:aws:iam::aws:policy/ServiceQuotasReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021-05-03T01:28:53.475-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-03T01:28:53.474-0300 | |
2021-05-03T01:28:53.475-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 230 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=58e80731067f97155ac3717dbf950a866a1f0740ea95ec7048c602eb5337f4b9 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/ServiceQuotasReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.475-0300 | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 376 | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)": visit complete | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 377 | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]: Destroying... [id=906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e,GROUP,797740695898,AWS_ACCOUNT,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy: Destroying... [id=arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021-05-03T01:28:53.498-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DeleteInlinePolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 157 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=34d3695befc09cf5293aa0d546dad7d7952a6798ee81a2f38ee58a1def752fc4 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DeleteInlinePolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.498-0300 | |
2021-05-03T01:28:53.499-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DeleteAccountAssignment Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 298 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=94b487f07d865a46e0020ea42c18ca5782368fd501419ceb11a6df77f532cb1c | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DeleteAccountAssignment | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.499-0300 | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)": visit complete | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:28:53 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:53 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 378 | |
2021/05/03 01:28:53 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:53 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)": visit complete | |
2021/05/03 01:28:53 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:28:53 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:28:53 [DEBUG] module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]: applying the planned Delete change | |
2021/05/03 01:28:53 [TRACE] GRPCProvider: ApplyResourceChange | |
2021-05-03T01:28:53.529-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-03T01:28:53.529-0300 | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]: Destroying... [id=arn:aws:iam::aws:policy/AmazonMSKReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021-05-03T01:28:53.530-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:53 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 226 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=c735d5ee8195eeb0e3c9727d6eda5092f68b4b5d5a363a10b06a4cdc91bf50da | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042853Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AmazonMSKReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:53.529-0300 | |
2021-05-03T01:28:54.180-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:54 GMT | |
X-Amzn-Requestid: 16db4918-eed5-4d46-b914-acd7b668dcf2 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:54.179-0300 | |
2021-05-03T01:28:54.180-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:28:54.179-0300 | |
2021/05/03 01:28:54 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0]: Destruction complete after 1s[0m[0m | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 379 | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:54 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)": visit complete | |
2021/05/03 01:28:54 [TRACE] dag/walk: vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" | |
2021/05/03 01:28:54 [TRACE] dag/walk: vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" | |
2021/05/03 01:28:54 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:28:54 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:28:54 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:28:54 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021-05-03T01:28:54.255-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:54 GMT | |
X-Amzn-Requestid: 5993a5a3-63e3-470a-851c-ee09af9e260b | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:54.255-0300 | |
2021-05-03T01:28:54.256-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:28:54.255-0300 | |
2021/05/03 01:28:54 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6]: Destruction complete after 1s[0m[0m | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 380 | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:54 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)": visit complete | |
2021-05-03T01:28:54.388-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:54 GMT | |
X-Amzn-Requestid: 8d2ad0e2-17b7-49df-b9ea-f9eba35c3233 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:54.387-0300 | |
2021-05-03T01:28:54.388-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:28:54.387-0300 | |
2021/05/03 01:28:54 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4]: Destruction complete after 1s[0m[0m | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 381 | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:54 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)": visit complete | |
2021-05-03T01:28:54.447-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DeleteInlinePolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:54 GMT | |
X-Amzn-Requestid: 68e00d80-0671-4510-82f1-af1fa0152404 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:54.447-0300 | |
2021-05-03T01:28:54.447-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:28:54.447-0300 | |
2021/05/03 01:28:54 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy: Destruction complete after 1s[0m[0m | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 382 | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:54 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)": visit complete | |
2021/05/03 01:28:54 [TRACE] dag/walk: visiting "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" | |
2021/05/03 01:28:54 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:28:54 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:54 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:54 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:28:54 [TRACE] states.SyncState: pruning module.test-provider-2.module.role-policies because it is empty | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 383 | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:54 [TRACE] vertex "module.test-provider-2.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)": visit complete | |
2021-05-03T01:28:54.571-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:54 GMT | |
X-Amzn-Requestid: 0964db19-0d75-42c5-b0b1-7d30514d5c89 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:54.570-0300 | |
2021-05-03T01:28:54.571-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:28:54.570-0300 | |
2021/05/03 01:28:54 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2]: Destruction complete after 1s[0m[0m | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 384 | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:54 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)": visit complete | |
2021/05/03 01:28:54 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021-05-03T01:28:54.691-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:54 GMT | |
X-Amzn-Requestid: 0b6dcfd9-fa70-4b7c-aafc-6096cfcac0ea | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:54.688-0300 | |
2021-05-03T01:28:54.691-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:28:54.689-0300 | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1]: Destruction complete after 2s[0m[0m | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 385 | |
2021/05/03 01:28:54 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:54 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)": visit complete | |
2021-05-03T01:28:54.732-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 400 Bad Request | |
Content-Length: 87 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:54 GMT | |
X-Amzn-Requestid: 892226e2-10b7-4188-89e2-53488eadcfb1 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:54.732-0300 | |
2021-05-03T01:28:54.732-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] {"__type":"ConflictException","Message":"There is a conflicting operation in process."}: timestamp=2021-05-03T01:28:54.732-0300 | |
2021-05-03T01:28:54.732-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Validate Response SSO Admin/DetachManagedPolicyFromPermissionSet failed, attempt 0/25, error ConflictException: There is a conflicting operation in process.: timestamp=2021-05-03T01:28:54.732-0300 | |
2021-05-03T01:28:54.732-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [TRACE] Waiting 500ms before next try: timestamp=2021-05-03T01:28:54.732-0300 | |
2021-05-03T01:28:54.896-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DeleteAccountAssignment Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 345 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:54 GMT | |
X-Amzn-Requestid: 42af5eb0-93e0-4e84-9500-f88d6c1daec7 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:54.896-0300 | |
2021-05-03T01:28:54.896-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] [aws-sdk-go] {"AccountAssignmentDeletionStatus":{"PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","RequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","Status":"IN_PROGRESS","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"}}: timestamp=2021-05-03T01:28:54.896-0300 | |
2021-05-03T01:28:54.896-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:54 [DEBUG] Waiting for state to become: [SUCCEEDED]: timestamp=2021-05-03T01:28:54.896-0300 | |
2021-05-03T01:28:55.133-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 400 Bad Request | |
Content-Length: 58 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:55 GMT | |
X-Amzn-Requestid: 9c417972-6073-414e-a3ad-38c36e096ecb | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:55.133-0300 | |
2021-05-03T01:28:55.133-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] {"__type":"ThrottlingException","message":"Rate exceeded"}: timestamp=2021-05-03T01:28:55.133-0300 | |
2021-05-03T01:28:55.133-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] DEBUG: Validate Response SSO Admin/DetachManagedPolicyFromPermissionSet failed, attempt 0/25, error ThrottlingException: Rate exceeded: timestamp=2021-05-03T01:28:55.133-0300 | |
2021-05-03T01:28:55.236-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 232 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=0e23d4c4d87965523f36e6f6869b5542e73bb94fb79dc7d72fec6f06059ffd91 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042855Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AWSCertificateManagerReadOnly","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:55.236-0300 | |
2021-05-03T01:28:55.890-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 400 Bad Request | |
Content-Length: 58 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:55 GMT | |
X-Amzn-Requestid: f6db2f18-56ec-4e89-9b47-722ee6be1ac5 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:55.889-0300 | |
2021-05-03T01:28:55.890-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] {"__type":"ThrottlingException","message":"Rate exceeded"}: timestamp=2021-05-03T01:28:55.890-0300 | |
2021-05-03T01:28:55.890-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] DEBUG: Validate Response SSO Admin/DetachManagedPolicyFromPermissionSet failed, attempt 0/25, error ThrottlingException: Rate exceeded: timestamp=2021-05-03T01:28:55.890-0300 | |
2021-05-03T01:28:55.934-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] DEBUG: Retrying Request SSO Admin/DetachManagedPolicyFromPermissionSet, attempt 1: timestamp=2021-05-03T01:28:55.934-0300 | |
2021-05-03T01:28:55.935-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:55 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 227 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=7504254eebbd933ce6fa98eda383c89e12b20a5c397d90c93cadc1f093151e0d | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042855Z | |
X-Amz-Security-Token: IQoJb3JpZ2luX2VjEFUaCXVzLWVhc3QtMSJHMEUCIFjq1qK2BPB+cT27kb9q0zqnmr5VNyQEA//q7OpdqAnFAiEA2t/cFWJhKw1sy7Hre14Y6dv3shgNfqBmI7dfq0GboqwqrwMIzv//////////ARAAGgw3OTc3NDA2OTU4OTgiDHaV2HPOqN3OfxGsZCqDAxiKLR1NLv4wj5VE6eD+WjvSIi7sF19/rtCYWgDdL+lauWAIfYhl3jfQoSGnLKypupqkK9l/+lIusoh3gGaFjDvz9NSAZOdE/xq4nArTYYg4flL/yylOUdlWviAmKbLIPS0IaujfpG2J04KZ1N3/IxL3N1DH9k4mIrxHhx5kSxY6NSHbfqu1Add09RWgX0E95zZgIbLZoSM6j1rTajVhNNvAQQfZStz3pJj/+DZkRvR5LuiaY/QaRi+1eKZ6B/3/S/Z4oOZQMckIMwQjvRGtSMLvFcxyNjCSvChMAsWq6ClQ0nIi8m2zDXBixXe3EHMjsF/NwCtZs7r7cne01I6TsGLv/tDV10yGJcWHHKul6seum7R1L31lNKrHGVveHAmbPaFs6flE6ihdK8Wlu/CltR1AIgDSn5aAlmP8QceuxysAuXfkYrDSua1PjutwlmlCitxS4cbsK/feocC9obfEMtmvfvk4qw1j4qg2TlLbojDxz7OFe6w+G5pKAI4svBkeJDNgGTCD+L2EBjqmAaP2B5Egn9Z01IQlgb3mFauHRw3uYrAjDL6z7RbXoaQvXQXPRQ+q5gdduEFUKdRxfzBM/LqtVbGseYk9qGrLX/w82EZPbk+9mwEA72algjopIaddIitLKXKgnfLNhDQFMjTebGlhhh9WVoyyX0NPrug1U9A0GbVR/0gjFMKTohJ8x7tvjaRi78viU+mfPk4+U+fhSAAz2KCy0bwnLFug7NkYbaKR51s= | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:55.935-0300 | |
2021-05-03T01:28:56.638-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:56 [DEBUG] [aws-sdk-go] DEBUG: Retrying Request SSO Admin/DetachManagedPolicyFromPermissionSet, attempt 1: timestamp=2021-05-03T01:28:56.638-0300 | |
2021-05-03T01:28:56.638-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:56 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 232 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=107e7fe428c10e80f3c39b6ed9bae1fc950ca52f42a5d9a3cb8eaa536e74f671 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042856Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AWSCertificateManagerReadOnly","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:56.638-0300 | |
2021-05-03T01:28:56.688-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:56 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:56 GMT | |
X-Amzn-Requestid: 4f93115c-cdac-4c8f-b63f-eab2c7ffd7ef | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:56.688-0300 | |
2021-05-03T01:28:56.688-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:56 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:28:56.688-0300 | |
2021/05/03 01:28:56 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:28:56 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5]: Destruction complete after 4s[0m[0m | |
2021/05/03 01:28:56 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 386 | |
2021/05/03 01:28:56 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:56 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)": visit complete | |
2021-05-03T01:28:57.390-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:57 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:28:57 GMT | |
X-Amzn-Requestid: 9b5b54cf-6770-4f16-8340-3168a2c48cf5 | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:57.389-0300 | |
2021-05-03T01:28:57.390-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:57 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:28:57.389-0300 | |
2021/05/03 01:28:57 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:28:57 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3]: Destruction complete after 4s[0m[0m | |
2021/05/03 01:28:57 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 387 | |
2021/05/03 01:28:57 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:28:57 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)": visit complete | |
2021/05/03 01:28:58 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:28:59 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:28:59 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:28:59 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:28:59 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021-05-03T01:28:59.901-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:28:59 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 140 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=3d54a733bcf5c62e2b63eab6d78622bb2f92075a58712ffd41b5bf43f376f866 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042859Z | |
X-Amz-Security-Token: IQoJb3JpZ2luX2VjEFUaCXVzLWVhc3QtMSJHMEUCIFjq1qK2BPB+cT27kb9q0zqnmr5VNyQEA//q7OpdqAnFAiEA2t/cFWJhKw1sy7Hre14Y6dv3shgNfqBmI7dfq0GboqwqrwMIzv//////////ARAAGgw3OTc3NDA2OTU4OTgiDHaV2HPOqN3OfxGsZCqDAxiKLR1NLv4wj5VE6eD+WjvSIi7sF19/rtCYWgDdL+lauWAIfYhl3jfQoSGnLKypupqkK9l/+lIusoh3gGaFjDvz9NSAZOdE/xq4nArTYYg4flL/yylOUdlWviAmKbLIPS0IaujfpG2J04KZ1N3/IxL3N1DH9k4mIrxHhx5kSxY6NSHbfqu1Add09RWgX0E95zZgIbLZoSM6j1rTajVhNNvAQQfZStz3pJj/+DZkRvR5LuiaY/QaRi+1eKZ6B/3/S/Z4oOZQMckIMwQjvRGtSMLvFcxyNjCSvChMAsWq6ClQ0nIi8m2zDXBixXe3EHMjsF/NwCtZs7r7cne01I6TsGLv/tDV10yGJcWHHKul6seum7R1L31lNKrHGVveHAmbPaFs6flE6ihdK8Wlu/CltR1AIgDSn5aAlmP8QceuxysAuXfkYrDSua1PjutwlmlCitxS4cbsK/feocC9obfEMtmvfvk4qw1j4qg2TlLbojDxz7OFe6w+G5pKAI4svBkeJDNgGTCD+L2EBjqmAaP2B5Egn9Z01IQlgb3mFauHRw3uYrAjDL6z7RbXoaQvXQXPRQ+q5gdduEFUKdRxfzBM/LqtVbGseYk9qGrLX/w82EZPbk+9mwEA72algjopIaddIitLKXKgnfLNhDQFMjTebGlhhh9WVoyyX0NPrug1U9A0GbVR/0gjFMKTohJ8x7tvjaRi78viU+mfPk4+U+fhSAAz2KCy0bwnLFug7NkYbaKR51s= | |
X-Amz-Target: SWBExternalService.DescribeAccountAssignmentDeletionStatus | |
Accept-Encoding: gzip | |
{"AccountAssignmentDeletionRequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:28:59.901-0300 | |
2021-05-03T01:29:00.633-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:00 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 375 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:29:00 GMT | |
X-Amzn-Requestid: e1470a72-e14e-4be5-a294-d3a15e46faae | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:00.633-0300 | |
2021-05-03T01:29:00.633-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:00 [DEBUG] [aws-sdk-go] {"AccountAssignmentDeletionStatus":{"CreatedDate":1.62001613483E9,"PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","RequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","Status":"IN_PROGRESS","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"}}: timestamp=2021-05-03T01:29:00.633-0300 | |
2021-05-03T01:29:00.633-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:00 [TRACE] Waiting 3s before next try: timestamp=2021-05-03T01:29:00.633-0300 | |
2021/05/03 01:29:02 [TRACE] dag/walk: vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]: Still destroying... [id=906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d...sso:::instance/ssoins-7223f43a8b17208a, 10s elapsed][0m[0m | |
2021/05/03 01:29:03 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021-05-03T01:29:03.639-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:03 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 140 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=d6d9da53f54d345a95cb0fcccfe738820247d156caae731c4a601470aff9092a | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042903Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DescribeAccountAssignmentDeletionStatus | |
Accept-Encoding: gzip | |
{"AccountAssignmentDeletionRequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:03.639-0300 | |
2021/05/03 01:29:04 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:04 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:29:04 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:29:04 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021-05-03T01:29:04.452-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:04 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 375 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:29:04 GMT | |
X-Amzn-Requestid: 90433df1-eb43-4323-95e6-fa2e27df2c18 | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:04.452-0300 | |
2021-05-03T01:29:04.452-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:04 [DEBUG] [aws-sdk-go] {"AccountAssignmentDeletionStatus":{"CreatedDate":1.62001613483E9,"PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","RequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","Status":"IN_PROGRESS","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"}}: timestamp=2021-05-03T01:29:04.452-0300 | |
2021-05-03T01:29:04.452-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:04 [TRACE] Waiting 6s before next try: timestamp=2021-05-03T01:29:04.452-0300 | |
2021/05/03 01:29:07 [TRACE] dag/walk: vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:29:08 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:09 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:29:09 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:29:09 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:29:09 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021-05-03T01:29:10.458-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:10 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 140 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=1817cb8e51ba6bb25ce474eff8f2037b641919661e990da244ce657d69a24ded | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042910Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DescribeAccountAssignmentDeletionStatus | |
Accept-Encoding: gzip | |
{"AccountAssignmentDeletionRequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:10.458-0300 | |
2021-05-03T01:29:11.363-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:11 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 375 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:29:11 GMT | |
X-Amzn-Requestid: 3b9a442d-2b1f-40f9-835b-88edaea3dfce | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:11.363-0300 | |
2021-05-03T01:29:11.363-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:11 [DEBUG] [aws-sdk-go] {"AccountAssignmentDeletionStatus":{"CreatedDate":1.62001613483E9,"PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","RequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","Status":"IN_PROGRESS","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"}}: timestamp=2021-05-03T01:29:11.363-0300 | |
2021-05-03T01:29:11.363-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:11 [TRACE] Waiting 10s before next try: timestamp=2021-05-03T01:29:11.363-0300 | |
2021/05/03 01:29:12 [TRACE] dag/walk: vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]: Still destroying... [id=906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d...sso:::instance/ssoins-7223f43a8b17208a, 20s elapsed][0m[0m | |
2021/05/03 01:29:13 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:14 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:29:14 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:14 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:29:14 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:29:17 [TRACE] dag/walk: vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:29:18 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:19 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:29:19 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:19 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:29:19 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021-05-03T01:29:21.366-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:21 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 140 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=4833f2408fa7f1771cf06935d6951e8523823c4461e7e33e1e20e8f16752d4db | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042921Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DescribeAccountAssignmentDeletionStatus | |
Accept-Encoding: gzip | |
{"AccountAssignmentDeletionRequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:21.366-0300 | |
2021-05-03T01:29:22.102-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:22 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 375 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:29:22 GMT | |
X-Amzn-Requestid: 90b44b46-d578-4c65-8ab5-de239efaacd0 | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:22.102-0300 | |
2021-05-03T01:29:22.102-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:22 [DEBUG] [aws-sdk-go] {"AccountAssignmentDeletionStatus":{"CreatedDate":1.62001613483E9,"PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","RequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","Status":"IN_PROGRESS","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"}}: timestamp=2021-05-03T01:29:22.102-0300 | |
2021-05-03T01:29:22.102-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:22 [TRACE] Waiting 10s before next try: timestamp=2021-05-03T01:29:22.102-0300 | |
2021/05/03 01:29:22 [TRACE] dag/walk: vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]: Still destroying... [id=906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d...sso:::instance/ssoins-7223f43a8b17208a, 31s elapsed][0m[0m | |
2021/05/03 01:29:23 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:24 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:29:24 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:29:24 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:29:24 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:27 [TRACE] dag/walk: vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:29:28 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:29 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:29:29 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:29:29 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:29 [TRACE] dag/walk: vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021-05-03T01:29:32.104-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:32 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 140 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=755887eb270a56364b06d3cbdfb17a2ac15803edd21204561eb06d8a8be97334 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042932Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DescribeAccountAssignmentDeletionStatus | |
Accept-Encoding: gzip | |
{"AccountAssignmentDeletionRequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:32.104-0300 | |
2021/05/03 01:29:32 [TRACE] dag/walk: vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021-05-03T01:29:32.882-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:32 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 373 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:29:32 GMT | |
X-Amzn-Requestid: 521a385e-9f4b-4d52-ab5b-3e9405b6c5e2 | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:32.881-0300 | |
2021-05-03T01:29:32.882-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:32 [DEBUG] [aws-sdk-go] {"AccountAssignmentDeletionStatus":{"CreatedDate":1.62001613483E9,"PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","RequestId":"42af5eb0-93e0-4e84-9500-f88d6c1daec7","Status":"SUCCEEDED","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"}}: timestamp=2021-05-03T01:29:32.882-0300 | |
2021/05/03 01:29:32 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:29:32 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0]: Destruction complete after 40s[0m[0m | |
2021/05/03 01:29:32 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 388 | |
2021/05/03 01:29:32 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:29:32 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)": visit complete | |
2021/05/03 01:29:32 [TRACE] dag/walk: visiting "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:29:32 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:29:32 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:29:32 [TRACE] dag/walk: visiting "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)" | |
2021/05/03 01:29:32 [TRACE] vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:29:32 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:29:32 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:29:32 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:29:32 [TRACE] UpgradeResourceState: schema version of module.test-provider-2.aws_ssoadmin_permission_set.permission-set is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:29:32 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:29:32 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.data.aws_identitystore_group.group[0] | |
2021/05/03 01:29:32 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:29:32 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 389 | |
2021/05/03 01:29:32 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:29:32 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:29:32 [DEBUG] module.test-provider-2.aws_ssoadmin_permission_set.permission-set: applying the planned Delete change | |
2021/05/03 01:29:32 [TRACE] GRPCProvider: ApplyResourceChange | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_permission_set.permission-set: Destroying... [id=arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021-05-03T01:29:32.908-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:32 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DeletePermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16.3; darwin; amd64) | |
Content-Length: 157 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNOMMAOXOP/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=8a306e91bd315c201245f23077c195e20924eb454165b26d02bebdaffc98c109 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T042932Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DeletePermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-eb12a5e3a0d6a825"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:32.908-0300 | |
2021/05/03 01:29:32 [TRACE] vertex "module.test-provider-2.data.aws_identitystore_group.group[0] (destroy)": visit complete | |
2021/05/03 01:29:33 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021-05-03T01:29:33.759-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:33 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DeletePermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:29:33 GMT | |
X-Amzn-Requestid: 820654dd-3ccb-4041-ad36-83d322018d61 | |
-----------------------------------------------------: timestamp=2021-05-03T01:29:33.759-0300 | |
2021-05-03T01:29:33.759-0300 [INFO] plugin.terraform-provider-aws: 2021/05/03 01:29:33 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:29:33.759-0300 | |
2021/05/03 01:29:33 [TRACE] EvalWriteState: removing state object for module.test-provider-2.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-2.aws_ssoadmin_permission_set.permission-set: Destruction complete after 1s[0m[0m | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 390 | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:29:33 [TRACE] vertex "module.test-provider-2.aws_ssoadmin_permission_set.permission-set (destroy)": visit complete | |
2021/05/03 01:29:33 [TRACE] dag/walk: visiting "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:29:33 [TRACE] vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:29:33 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:29:33 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:29:33 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-2.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:29:33 [TRACE] states.SyncState: pruning module.test-provider-2 because it is empty | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 391 | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:29:33 [TRACE] vertex "module.test-provider-2.data.aws_ssoadmin_instances.okta (destroy)": visit complete | |
2021/05/03 01:29:33 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021/05/03 01:29:33 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:29:33 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:29:33 [TRACE] GRPCProvider: Close | |
2021/05/03 01:29:33 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/05/03 01:29:33 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-05-03T01:29:33.791-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:29:33.799-0300 [DEBUG] plugin: plugin process exited: path=/Users/jvitor/golang/bin/terraform-provider-aws pid=30252 | |
2021-05-03T01:29:33.799-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:29:33 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021/05/03 01:29:33 [TRACE] dag/walk: visiting "root" | |
2021/05/03 01:29:33 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:29:33 [TRACE] vertex "root": visit complete | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 392 | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
[0m[1m[32m | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: removing lock metadata file .terraform.tfstate.lock.info | |
Destroy complete! Resources: 10 destroyed.[0m | |
2021/05/03 01:29:33 [TRACE] statemgr.Filesystem: unlocking terraform.tfstate using fcntl flock |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment