Created
May 3, 2021 18:52
-
-
Save jvitor03/e393feae47b3a137984ec18e488e1477 to your computer and use it in GitHub Desktop.
terraform-provider-aws bug when using aws_ssoadmin_managed_policy_attachment in multiple pipelines for creation/destruction: ConflictException: There is a conflicting operation in process.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2021/05/03 01:32:07 [INFO] Terraform version: 0.14.7 | |
2021/05/03 01:32:07 [INFO] Go runtime version: go1.15.6 | |
2021/05/03 01:32:07 [INFO] CLI args: []string{"/Users/jvitor/.tfenv/versions/0.14.7/terraform", "destroy", "-auto-approve"} | |
2021/05/03 01:32:07 [DEBUG] Attempting to open CLI config file: /Users/jvitor/.terraformrc | |
2021/05/03 01:32:07 Loading CLI configuration from /Users/jvitor/.terraformrc | |
2021/05/03 01:32:07 [DEBUG] checking for credentials in "/Users/jvitor/.terraform.d/plugins" | |
2021/05/03 01:32:07 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2021/05/03 01:32:07 [DEBUG] will search for provider plugins in /Users/jvitor/.terraform.d/plugins | |
2021/05/03 01:32:07 [TRACE] getproviders.SearchLocalDirectory: /Users/jvitor/.terraform.d/plugins is a symlink to /Users/jvitor/.terraform.d/plugins | |
2021/05/03 01:32:07 [TRACE] getproviders.SearchLocalDirectory: found git.topfreegames.com/sre/visibility v0.1.0 for darwin_amd64 at /Users/jvitor/.terraform.d/plugins/git.topfreegames.com/sre/visibility/0.1/darwin_amd64 | |
2021/05/03 01:32:07 [TRACE] getproviders.SearchLocalDirectory: found git.topfreegames.com/sre/visibility v0.2.0 for darwin_amd64 at /Users/jvitor/.terraform.d/plugins/git.topfreegames.com/sre/visibility/0.2/darwin_amd64 | |
2021/05/03 01:32:07 [TRACE] getproviders.SearchLocalDirectory: found hashicorp.com/edu/visibility v0.2.0 for darwin_amd64 at /Users/jvitor/.terraform.d/plugins/hashicorp.com/edu/visibility/0.2/darwin_amd64 | |
2021/05/03 01:32:07 [TRACE] getproviders.SearchLocalDirectory: found hashicorp.com/edu/visibility-service v0.2.0 for darwin_amd64 at /Users/jvitor/.terraform.d/plugins/hashicorp.com/edu/visibility-service/0.2/darwin_amd64 | |
2021/05/03 01:32:07 [DEBUG] ignoring non-existing provider search directory /Users/jvitor/Library/Application Support/io.terraform/plugins | |
2021/05/03 01:32:07 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins | |
2021/05/03 01:32:07 [INFO] CLI command args: []string{"destroy", "-auto-approve"} | |
2021/05/03 01:32:07 [TRACE] Meta.Backend: no config given or present on disk, so returning nil config | |
2021/05/03 01:32:07 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory | |
2021/05/03 01:32:07 [DEBUG] New state was assigned lineage "9e48094d-a302-a79d-74cf-04b5c3203bd3" | |
2021/05/03 01:32:07 [TRACE] Meta.Backend: using default local state only (no backend configuration, and no existing initialized backend) | |
2021/05/03 01:32:07 [TRACE] Meta.Backend: instantiated backend of type <nil> | |
2021/05/03 01:32:07 [TRACE] providercache.fillMetaCache: scanning directory .terraform/providers | |
2021/05/03 01:32:07 [TRACE] getproviders.SearchLocalDirectory: .terraform/providers is a symlink to .terraform/providers | |
2021/05/03 01:32:07 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/aws v3.38.0 for darwin_amd64 at .terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64 | |
2021/05/03 01:32:07 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/null v3.1.0 for darwin_amd64 at .terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64 | |
2021/05/03 01:32:07 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64 as a candidate package for registry.terraform.io/hashicorp/aws 3.38.0 | |
2021/05/03 01:32:07 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64 as a candidate package for registry.terraform.io/hashicorp/null 3.1.0 | |
2021/05/03 01:32:09 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021/05/03 01:32:09 [DEBUG] checking for provisioner in "." | |
2021/05/03 01:32:09 [DEBUG] checking for provisioner in "/Users/jvitor/.tfenv/versions/0.14.7" | |
2021/05/03 01:32:09 [DEBUG] checking for provisioner in "/Users/jvitor/.terraform.d/plugins" | |
2021/05/03 01:32:09 [INFO] Failed to read plugin lock file .terraform/plugins/darwin_amd64/lock.json: open .terraform/plugins/darwin_amd64/lock.json: no such file or directory | |
2021/05/03 01:32:09 [TRACE] Meta.Backend: backend <nil> does not support operations, so wrapping it in a local backend | |
2021/05/03 01:32:09 [INFO] backend/local: starting Apply operation | |
2021/05/03 01:32:09 [TRACE] backend/local: requesting state manager for workspace "default" | |
2021/05/03 01:32:09 [TRACE] backend/local: state manager for workspace "default" will: | |
- read initial snapshot from terraform.tfstate | |
- write new snapshots to terraform.tfstate | |
- create any backup at terraform.tfstate.backup | |
2021/05/03 01:32:09 [TRACE] backend/local: requesting state lock for workspace "default" | |
2021/05/03 01:32:09 [TRACE] statemgr.Filesystem: preparing to manage state snapshots at terraform.tfstate | |
2021/05/03 01:32:09 [TRACE] statemgr.Filesystem: existing snapshot has lineage "f3d9469f-7e9f-8cd8-2a1a-360f396786aa" serial 433 | |
2021/05/03 01:32:09 [TRACE] statemgr.Filesystem: locking terraform.tfstate using fcntl flock | |
2021/05/03 01:32:09 [TRACE] statemgr.Filesystem: writing lock metadata to .terraform.tfstate.lock.info | |
2021/05/03 01:32:09 [TRACE] backend/local: reading remote state for workspace "default" | |
2021/05/03 01:32:09 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate | |
2021/05/03 01:32:09 [TRACE] statemgr.Filesystem: read snapshot with lineage "f3d9469f-7e9f-8cd8-2a1a-360f396786aa" serial 433 | |
2021/05/03 01:32:09 [TRACE] backend/local: retrieving local state snapshot for workspace "default" | |
2021/05/03 01:32:09 [TRACE] backend/local: building context for current working directory | |
2021/05/03 01:32:09 [TRACE] terraform.NewContext: starting | |
2021/05/03 01:32:09 [TRACE] terraform.NewContext: loading provider schemas | |
2021/05/03 01:32:09 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/aws" | |
2021-05-03T01:32:09.369-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:32:09.703-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5] | |
2021-05-03T01:32:09.725-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 pid=30687 | |
2021-05-03T01:32:09.726-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 | |
2021-05-03T01:32:09.836-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:32:09.835-0300 | |
2021-05-03T01:32:09.942-0300 [DEBUG] plugin.terraform-provider-aws_v3.38.0_x5: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin324308562 network=unix timestamp=2021-05-03T01:32:09.942-0300 | |
2021-05-03T01:32:09.942-0300 [DEBUG] plugin: using plugin: version=5 | |
2021/05/03 01:32:10 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:32:10.059-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:32:10 [TRACE] GRPCProvider: Close | |
2021-05-03T01:32:10.489-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:32:10.496-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 pid=30687 | |
2021-05-03T01:32:10.496-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:32:10 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/null" | |
2021-05-03T01:32:10.497-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:32:10.698-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5] | |
2021-05-03T01:32:10.781-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30690 | |
2021-05-03T01:32:10.781-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 | |
2021-05-03T01:32:10.781-0300 [INFO] plugin.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:32:10.751-0300 | |
2021-05-03T01:32:10.959-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:32:10.959-0300 [DEBUG] plugin.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin269849241 network=unix timestamp=2021-05-03T01:32:10.958-0300 | |
2021/05/03 01:32:11 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:32:11.108-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:32:11 [TRACE] GRPCProvider: Close | |
2021-05-03T01:32:11.114-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:32:11.117-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30690 | |
2021-05-03T01:32:11.117-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:32:11 [TRACE] terraform.NewContext: complete | |
2021/05/03 01:32:11 [TRACE] backend/local: finished building terraform.Context | |
2021/05/03 01:32:11 [TRACE] backend/local: requesting interactive input, if necessary | |
2021/05/03 01:32:11 [TRACE] Context.Input: Prompting for provider arguments | |
2021/05/03 01:32:11 [TRACE] Context.Input: Provider provider.aws declared at provider.tf:1,1-15 | |
2021/05/03 01:32:11 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{} | |
2021/05/03 01:32:11 [TRACE] backend/local: running validation operation | |
2021/05/03 01:32:11 [INFO] terraform: building graph: GraphTypeValidate | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/05/03 01:32:11 [TRACE] ConfigTransformer: Starting for path: | |
2021/05/03 01:32:11 [TRACE] ConfigTransformer: Starting for path: module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ConfigTransformer: Starting for path: module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/03 01:32:11 [TRACE] OutputTransformer: adding policy_json as *terraform.nodeExpandOutput | |
2021/05/03 01:32:11 [TRACE] OutputTransformer: adding aws_managed_policies as *terraform.nodeExpandOutput | |
2021/05/03 01:32:11 [TRACE] OutputTransformer: adding permission_set_name as *terraform.nodeExpandOutput | |
2021/05/03 01:32:11 [TRACE] OutputTransformer: adding permission_set_arn as *terraform.nodeExpandOutput | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/05/03 01:32:11 [TRACE] StateTransformer: state is empty, so nothing to do | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.null_resource.check_valid_account" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-1/validations.tf:5,1-47 | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.null_resource.check_valid_account | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/default_deny_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:55, Byte:54}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/default_allow_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:8, Column:1, Byte:119}, End:hcl.Pos{Line:8, Column:56, Byte:174}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/main.tf", Start:hcl.Pos{Line:2, Column:1, Byte:36}, End:hcl.Pos{Line:2, Column:53, Byte:88}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.data.aws_identitystore_group.group" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1/main.tf", Start:hcl.Pos{Line:28, Column:1, Byte:762}, End:hcl.Pos{Line:28, Column:39, Byte:800}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.data.aws_identitystore_group.group | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_permission_set.permission-set" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-1/main.tf:38,1-56 | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:21, Column:1, Byte:506}, End:hcl.Pos{Line:21, Column:64, Byte:569}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-1/main.tf:67,1-77 | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.data.aws_ssoadmin_instances.okta" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1/main.tf", Start:hcl.Pos{Line:26, Column:1, Byte:721}, End:hcl.Pos{Line:26, Column:37, Byte:757}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:12, Column:1, Byte:232}, End:hcl.Pos{Line:12, Column:71, Byte:302}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account" (*terraform.NodeValidatableResource) config from .terraform/modules/test-provider-1/main.tf:45,1-74 | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/custom_arns_policies.tf", Start:hcl.Pos{Line:10, Column:1, Byte:303}, End:hcl.Pos{Line:10, Column:52, Byte:354}} | |
2021/05/03 01:32:11 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/03 01:32:11 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from provider.tf:1,1-15 | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/03 01:32:11 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/null"], implied first by module.test-provider-1.null_resource.check_valid_account | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.null_resource.check_valid_account uses inherited configuration provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.null_resource.check_valid_account" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.data.aws_identitystore_group.group uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.data.aws_identitystore_group.group" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:11 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/03 01:32:11 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.null_resource.check_valid_account | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.data.aws_identitystore_group.group | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account | |
2021/05/03 01:32:11 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: Added module.test-provider-1 as *terraform.nodeValidateModule | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.dynamo_tables_arn (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.aws_account (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.aws_accounts (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.custom_policy_json (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.sso_role_name (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.validate_account (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.okta_groups (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.shared_policies (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.dynamo_tables_names (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.lambdas_arn (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.buckets_arn (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.null_resource.check_valid_account must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1 (close) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.okta_groups (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.environment (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.output.permission_set_arn (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.data.aws_identitystore_group.group must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.product_name (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.buckets_names (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.sre_okta_group (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.output.permission_set_name (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.allowed_resources (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.lambdas_names (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.aws_account_alias (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: Added module.test-provider-1.module.role-policies as *terraform.nodeValidateModule | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies (expand) must wait for expansion of module.test-provider-1 (expand) | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.all_arns (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.bucket_objects (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.var.shared_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies (close) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.shared_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.var.custom_arns (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.output.policy_json (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.var.role_name (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.var.custom_policy_json (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer with new graph: | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.custom_policy_json (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.var.role_name (expand)" references: [module.test-provider-1.local.sso_role_name (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.buckets_arn (expand)" references: [module.test-provider-1.var.buckets_names (expand)] | |
2021/05/03 01:32:11 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account" references: [module.test-provider-1.local.okta_groups (expand) module.test-provider-1.aws_ssoadmin_permission_set.permission-set module.test-provider-1.aws_ssoadmin_permission_set.permission-set module.test-provider-1.data.aws_identitystore_group.group module.test-provider-1.local.aws_account (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.var.custom_policy_json (expand)" references: [module.test-provider-1.var.custom_policy_json (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.okta_groups (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1 (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.null_resource.check_valid_account" references: [module.test-provider-1.local.validate_account (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies" references: [module.test-provider-1.module.role-policies.var.role_name (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.all_arns (expand)" references: [module.test-provider-1.module.role-policies.local.bucket_objects (expand) module.test-provider-1.module.role-policies.var.custom_arns (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1 (close)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)" references: [module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)] | |
2021/05/03 01:32:11 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.data.aws_identitystore_group.group" references: [module.test-provider-1.local.okta_groups (expand) module.test-provider-1.data.aws_ssoadmin_instances.okta module.test-provider-1.local.okta_groups (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies" references: [module.test-provider-1.module.role-policies.var.custom_policy_json (expand) module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.environment (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.product_name (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.sre_okta_group (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.output.permission_set_name (expand)" references: [module.test-provider-1.local.sso_role_name (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" references: [module.test-provider-1.module.role-policies.output.policy_json (expand) module.test-provider-1.aws_ssoadmin_permission_set.permission-set module.test-provider-1.aws_ssoadmin_permission_set.permission-set] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.lambdas_names (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.allowed_resources (expand)" references: [module.test-provider-1.local.buckets_arn (expand) module.test-provider-1.local.lambdas_arn (expand) module.test-provider-1.local.dynamo_tables_arn (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.aws_accounts (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.bucket_objects (expand)" references: [module.test-provider-1.module.role-policies.var.custom_arns (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.var.shared_policies (expand)" references: [module.test-provider-1.var.shared_policies (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.dynamo_tables_arn (expand)" references: [module.test-provider-1.var.dynamo_tables_names (expand) module.test-provider-1.local.aws_account (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.aws_account (expand)" references: [module.test-provider-1.local.aws_accounts (expand) module.test-provider-1.var.aws_account_alias (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.validate_account (expand)" references: [module.test-provider-1.local.aws_accounts (expand) module.test-provider-1.var.aws_account_alias (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.sso_role_name (expand)" references: [module.test-provider-1.var.product_name (expand) module.test-provider-1.var.environment (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies (close)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.dynamo_tables_names (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.lambdas_arn (expand)" references: [module.test-provider-1.var.lambdas_names (expand) module.test-provider-1.local.aws_account (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" references: [module.test-provider-1.module.role-policies.local.all_arns (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.shared_policies (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)" references: [module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/null\"]" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" references: [module.test-provider-1.module.role-policies.local.shared_policies (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.okta_groups (expand)" references: [module.test-provider-1.var.okta_groups (expand) module.test-provider-1.local.sre_okta_group (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.shared_policies (expand)" references: [module.test-provider-1.module.role-policies.var.shared_policies (expand) module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.output.permission_set_arn (expand)" references: [module.test-provider-1.aws_ssoadmin_permission_set.permission-set] | |
2021/05/03 01:32:11 [INFO] ReferenceTransformer: reference not found: "count.index" | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies" references: [module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) module.test-provider-1.aws_ssoadmin_permission_set.permission-set module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) module.test-provider-1.aws_ssoadmin_permission_set.permission-set] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand)" references: [module.test-provider-1.module.role-policies.var.custom_arns (expand) module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set" references: [module.test-provider-1.local.sso_role_name (expand) module.test-provider-1.var.environment (expand) module.test-provider-1.var.product_name (expand) module.test-provider-1.data.aws_ssoadmin_instances.okta] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.var.custom_arns (expand)" references: [module.test-provider-1.local.allowed_resources (expand)] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.buckets_names (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.aws_account_alias (expand)" references: [] | |
2021/05/03 01:32:11 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.output.policy_json (expand)" references: [module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies] | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.attachDataResourceDependenciesTransformer | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless depends on [] | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta depends on [] | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion depends on [] | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies depends on [] | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies depends on [] | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.data.aws_identitystore_group.group depends on [] | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy depends on [] | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies depends on [] | |
2021/05/03 01:32:11 [TRACE] attachDataDependenciesTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies depends on [] | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.attachDataResourceDependenciesTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:32:11 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/03 01:32:11 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.data.aws_identitystore_group.group - *terraform.NodeValidatableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodeValidatableResource | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodeValidatableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodeValidatableResource | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies - *terraform.NodeValidatableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.null_resource.check_valid_account - *terraform.NodeValidatableResource | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:32:11 [DEBUG] Starting graph walk: walkValidate | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1 (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1 (expand)": starting visit (*terraform.nodeValidateModule) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/null\"]" | |
2021/05/03 01:32:11 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1 (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.buckets_names (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.buckets_names (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.aws_account_alias (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.buckets_names (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.aws_accounts (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_accounts (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_accounts (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.aws_accounts as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_accounts (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.aws_accounts" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_accounts": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.okta_groups (expand)" | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.sre_okta_group (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sre_okta_group (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sre_okta_group (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.sre_okta_group as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sre_okta_group (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.sre_okta_group" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sre_okta_group": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sre_okta_group": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sre_okta_group (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sre_okta_group (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.shared_policies (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.shared_policies (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.shared_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.shared_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.shared_policies" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.shared_policies": starting visit (*terraform.nodeModuleVariable) | |
2021-05-03T01:32:11.143-0300 [INFO] plugin: configuring client automatic mTLS | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.var.shared_policies, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.shared_policies": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.shared_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.shared_policies (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.aws_account_alias (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.aws_account_alias (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.aws_account_alias (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.aws_account_alias" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.aws_account_alias": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.aws_account_alias": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.aws_account_alias (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.aws_account_alias (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.okta_groups (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.okta_groups (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.okta_groups (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.okta_groups" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.okta_groups": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.var.okta_groups, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.okta_groups": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.okta_groups (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.okta_groups (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.okta_groups (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.okta_groups (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.okta_groups (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.okta_groups as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.okta_groups (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.okta_groups" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.okta_groups": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.okta_groups": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.okta_groups (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.okta_groups (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_accounts": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_accounts (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_accounts (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.validate_account (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.validate_account (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.validate_account (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.validate_account as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.validate_account (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.validate_account" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.validate_account": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.environment (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.environment (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.lambdas_names (expand)" | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.product_name (expand)" | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies (expand)" | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.dynamo_tables_names (expand)" | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.custom_policy_json (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.validate_account": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.dynamo_tables_names (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies (expand)": starting visit (*terraform.nodeValidateModule) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.validate_account (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.validate_account (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.dynamo_tables_names (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.environment (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.buckets_names (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.buckets_names" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.buckets_names": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.lambdas_names (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.lambdas_names (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.custom_policy_json (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.custom_policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.aws_account (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_account (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_account (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.var.buckets_names, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.buckets_names": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.buckets_names (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.buckets_names (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.buckets_arn (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.buckets_arn (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.buckets_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.buckets_arn as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.buckets_arn (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.lambdas_names (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.lambdas_names" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.lambdas_names": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.buckets_arn" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.buckets_arn": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.var.lambdas_names, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.lambdas_names": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.lambdas_names (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.lambdas_names (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.custom_policy_json (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.custom_policy_json" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.custom_policy_json": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.aws_account as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_account (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.buckets_arn": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.buckets_arn (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.buckets_arn (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.product_name (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.aws_account" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_account": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.product_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.product_name (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.product_name" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.product_name": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.var.product_name, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.product_name": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_account": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_account (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.aws_account (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.product_name (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.product_name (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.var.shared_policies (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.shared_policies (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.shared_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.shared_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.dynamo_tables_names (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.dynamo_tables_names" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.dynamo_tables_names": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.var.shared_policies" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.shared_policies": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.var.dynamo_tables_names, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.dynamo_tables_names": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.dynamo_tables_names (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.dynamo_tables_names (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.dynamo_tables_arn (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.dynamo_tables_arn (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.dynamo_tables_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.dynamo_tables_arn as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.lambdas_arn (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.lambdas_arn (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.lambdas_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.dynamo_tables_arn (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.lambdas_arn as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.lambdas_arn (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.dynamo_tables_arn" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.dynamo_tables_arn": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.lambdas_arn" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.lambdas_arn": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.environment (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.dynamo_tables_arn": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.dynamo_tables_arn (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.dynamo_tables_arn (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.var.environment" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.environment": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.module.role-policies.var.shared_policies, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.shared_policies": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.shared_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.shared_policies (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.module.role-policies.local.aws_managed_policies as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.aws_managed_policies" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.aws_managed_policies": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.environment": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.environment (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.environment (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.sso_role_name (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sso_role_name (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sso_role_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.sso_role_name as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sso_role_name (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.sso_role_name" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sso_role_name": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sso_role_name": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sso_role_name (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.sso_role_name (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.output.permission_set_name (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding output: adding module.test-provider-1.output.permission_set_name as *terraform.NodeApplyableOutput | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.aws_managed_policies": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding output: adding module.test-provider-1.module.role-policies.output.aws_managed_policies as *terraform.NodeApplyableOutput | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.output.permission_set_name" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.output.permission_set_name": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.output.aws_managed_policies" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.lambdas_arn": visit complete | |
2021/05/03 01:32:11 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-1.output.permission_set_name in changeset | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.lambdas_arn (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] EvalWriteOutput: Removing module.test-provider-1.output.permission_set_name from state (it is now null) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.lambdas_arn (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.output.permission_set_name": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.var.role_name (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.role_name (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.allowed_resources (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.allowed_resources (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.allowed_resources (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.local.allowed_resources as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.allowed_resources (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-1.module.role-policies.output.aws_managed_policies in changeset | |
2021/05/03 01:32:11 [TRACE] EvalWriteOutput: Saving value for module.test-provider-1.module.role-policies.output.aws_managed_policies in state | |
2021/05/03 01:32:11 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-1.module.role-policies.output.aws_managed_policies in changeset | |
2021/05/03 01:32:11 [TRACE] EvalWriteOutput: Saving value for module.test-provider-1.module.role-policies.output.aws_managed_policies in state | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.local.allowed_resources" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.allowed_resources": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.role_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.role_name (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.var.role_name" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.role_name": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.module.role-policies.var.role_name, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.allowed_resources": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.role_name": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.allowed_resources (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.role_name (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.local.allowed_resources (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.role_name (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.var.custom_arns (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_arns (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_arns (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_arns (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.var.custom_policy_json, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.custom_policy_json": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.custom_policy_json (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.var.custom_policy_json (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.var.custom_arns" | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.var.custom_policy_json (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_arns": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_policy_json (expand)": starting visit (*terraform.nodeExpandModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_policy_json (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.module.role-policies.var.custom_arns, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_arns": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_arns (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.var.custom_policy_json" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_policy_json": starting visit (*terraform.nodeModuleVariable) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_arns (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.bucket_objects (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.bucket_objects (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.bucket_objects (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.module.role-policies.local.bucket_objects as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.bucket_objects (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.bucket_objects" | |
2021/05/03 01:32:11 [TRACE] evalVariableValidations: not active for module.test-provider-1.module.role-policies.var.custom_policy_json, so skipping | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_policy_json": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_policy_json (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.var.custom_policy_json (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.bucket_objects": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.bucket_objects": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.bucket_objects (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.bucket_objects (expand)": visit complete | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.all_arns (expand)" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.all_arns (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.all_arns (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] Expanding local: adding module.test-provider-1.module.role-policies.local.all_arns as *terraform.NodeLocal | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.all_arns (expand)": entering dynamic subgraph | |
2021/05/03 01:32:11 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.all_arns" | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.all_arns": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.all_arns": visit complete | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.all_arns (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:11 [TRACE] vertex "module.test-provider-1.module.role-policies.local.all_arns (expand)": visit complete | |
2021-05-03T01:32:11.403-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5] | |
2021-05-03T01:32:11.515-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 pid=30694 | |
2021-05-03T01:32:11.516-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 | |
2021-05-03T01:32:11.516-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:32:11.511-0300 | |
2021-05-03T01:32:11.720-0300 [DEBUG] plugin.terraform-provider-aws_v3.38.0_x5: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin793171629 network=unix timestamp=2021-05-03T01:32:11.720-0300 | |
2021-05-03T01:32:11.729-0300 [DEBUG] plugin: using plugin: version=5 | |
2021/05/03 01:32:11 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:11 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021/05/03 01:32:11 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:32:11.895-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021-05-03T01:32:11.895-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:32:12.177-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5] | |
2021-05-03T01:32:12.190-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30699 | |
2021-05-03T01:32:12.191-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 | |
2021-05-03T01:32:12.207-0300 [INFO] plugin.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:32:12.205-0300 | |
2021-05-03T01:32:12.315-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:32:12.317-0300 [DEBUG] plugin.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin813701718 network=unix timestamp=2021-05-03T01:32:12.315-0300 | |
2021/05/03 01:32:12 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/null\"]" provider for provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:32:12 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/null"]: no configuration at all | |
2021/05/03 01:32:12 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:32:12.672-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:32:12 [TRACE] GRPCProvider: PrepareProviderConfig | |
2021/05/03 01:32:12 [TRACE] GRPCProvider: PrepareProviderConfig | |
2021/05/03 01:32:12 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"]": visit complete | |
2021/05/03 01:32:12 [TRACE] dag/walk: visiting "module.test-provider-1.null_resource.check_valid_account" | |
2021/05/03 01:32:12 [TRACE] vertex "module.test-provider-1.null_resource.check_valid_account": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:12 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:32:12 [TRACE] vertex "module.test-provider-1.null_resource.check_valid_account": visit complete | |
2021/05/03 01:32:12 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/null\"] (close)" | |
2021/05/03 01:32:12 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:32:12 [TRACE] GRPCProvider: Close | |
2021-05-03T01:32:12.715-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:32:12.716-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30699 | |
2021-05-03T01:32:12.716-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:32:12 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"] (close)": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.data.aws_ssoadmin_instances.okta" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.data.aws_ssoadmin_instances.okta": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless": visit complete | |
2021-05-03T01:32:13.123-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:13 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:32:13.122-0300 | |
2021-05-03T01:32:13.123-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:13 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:32:13.122-0300 | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021-05-03T01:32:13.129-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:13 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:32:13.126-0300 | |
2021-05-03T01:32:13.129-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:13 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:32:13.129-0300 | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] Expanding local: adding module.test-provider-1.module.role-policies.local.shared_policies_struct as *terraform.NodeLocal | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)": entering dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.shared_policies_struct" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies_struct": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.data.aws_ssoadmin_instances.okta": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.data.aws_identitystore_group.group" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.data.aws_identitystore_group.group": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies_struct": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.shared_policies (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] Expanding local: adding module.test-provider-1.module.role-policies.local.shared_policies as *terraform.NodeLocal | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies (expand)": entering dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.shared_policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_permission_set.permission-set" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set.permission-set": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.shared_policies (expand)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] Expanding local: adding module.test-provider-1.module.role-policies.local.custom_arn_policy_json as *terraform.NodeLocal | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand)": entering dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.local.custom_arn_policy_json" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.custom_arn_policy_json": starting visit (*terraform.NodeLocal) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.custom_arn_policy_json": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand)": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set.permission-set": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.output.permission_set_arn (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] Expanding output: adding module.test-provider-1.output.permission_set_arn as *terraform.NodeApplyableOutput | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": entering dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.output.permission_set_arn" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/03 01:32:13 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-1.output.permission_set_arn in changeset | |
2021/05/03 01:32:13 [TRACE] EvalWriteOutput: Removing module.test-provider-1.output.permission_set_arn from state (it is now null) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.data.aws_identitystore_group.group": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies": starting visit (*terraform.NodeValidatableResource) | |
2021-05-03T01:32:13.151-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:13 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:32:13.150-0300 | |
2021-05-03T01:32:13.151-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:13 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:32:13.150-0300 | |
2021-05-03T01:32:13.151-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:13 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:32:13.150-0300 | |
2021-05-03T01:32:13.151-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:13 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-03T01:32:13.150-0300 | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.output.policy_json (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] Expanding output: adding module.test-provider-1.module.role-policies.output.policy_json as *terraform.NodeApplyableOutput | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": entering dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.output.policy_json" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json": starting visit (*terraform.NodeApplyableOutput) | |
2021/05/03 01:32:13 [TRACE] ExecuteWriteOutput: Saving Create change for module.test-provider-1.module.role-policies.output.policy_json in changeset | |
2021/05/03 01:32:13 [TRACE] EvalWriteOutput: Removing module.test-provider-1.module.role-policies.output.policy_json from state (it is now null) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": dynamic subgraph completed successfully | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies (close)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies (close)": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies (close)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy": starting visit (*terraform.NodeValidatableResource) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021/05/03 01:32:13 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: Close | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1 (close)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1 (close)": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1 (close)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)" | |
2021/05/03 01:32:13 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021/05/03 01:32:13 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-05-03T01:32:13.161-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:32:13.167-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 pid=30694 | |
2021-05-03T01:32:13.168-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:32:13 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "root" | |
2021/05/03 01:32:13 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:32:13 [TRACE] vertex "root": visit complete | |
2021/05/03 01:32:13 [INFO] backend/local: apply calling Plan | |
2021/05/03 01:32:13 [INFO] terraform: building graph: GraphTypePlanDestroy | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021/05/03 01:32:13 [TRACE] StateTransformer: creating nodes for both current and deposed instance objects | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_permission_set.permission-set current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.data.aws_identitystore_group.group[0] current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.data.aws_ssoadmin_instances.okta current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy current object | |
2021/05/03 01:32:13 [TRACE] StateTransformer: added *terraform.NodePlanDestroyableResourceInstance for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies current object | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.StateTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
------ | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/03 01:32:13 [TRACE] OutputTransformer: adding policy_json as *terraform.nodeExpandOutput | |
2021/05/03 01:32:13 [TRACE] OutputTransformer: adding aws_managed_policies as *terraform.nodeExpandOutput | |
2021/05/03 01:32:13 [TRACE] OutputTransformer: adding permission_set_arn as *terraform.nodeExpandOutput | |
2021/05/03 01:32:13 [TRACE] OutputTransformer: adding permission_set_name as *terraform.nodeExpandOutput | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
------ | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:67,1-77 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:12, Column:1, Byte:232}, End:hcl.Pos{Line:12, Column:71, Byte:302}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:21, Column:1, Byte:506}, End:hcl.Pos{Line:21, Column:64, Byte:569}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/custom_arns_policies.tf", Start:hcl.Pos{Line:10, Column:1, Byte:303}, End:hcl.Pos{Line:10, Column:52, Byte:354}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/default_allow_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.data.aws_identitystore_group.group[0]" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1/main.tf", Start:hcl.Pos{Line:28, Column:1, Byte:762}, End:hcl.Pos{Line:28, Column:39, Byte:800}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:8, Column:1, Byte:119}, End:hcl.Pos{Line:8, Column:56, Byte:174}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_permission_set.permission-set" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:38,1-56 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.data.aws_ssoadmin_instances.okta" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1/main.tf", Start:hcl.Pos{Line:26, Column:1, Byte:721}, End:hcl.Pos{Line:26, Column:37, Byte:757}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/default_deny_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:55, Byte:54}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodePlanDestroyableResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/main.tf", Start:hcl.Pos{Line:2, Column:1, Byte:36}, End:hcl.Pos{Line:2, Column:53, Byte:88}} | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]" (*terraform.NodePlanDestroyableResourceInstance) config from .terraform/modules/test-provider-1/main.tf:45,1-74 | |
2021/05/03 01:32:13 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/03 01:32:13 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from provider.tf:1,1-15 | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.data.aws_identitystore_group.group[0] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.data.aws_identitystore_group.group[0]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:13 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodePlanDestroyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/03 01:32:13 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.data.aws_identitystore_group.group[0]" (*terraform.NodePlanDestroyableResourceInstance) destroys module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_identitystore_group.group[0] has stored dependency of module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set has stored dependency of module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta has stored dependency of module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:13 [TRACE] DestroyEdgeTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies has stored dependency of module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:32:13 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/03 01:32:13 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies - *terraform.NodePlanDestroyableResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies - *terraform.NodePlanDestroyableResourceInstance | |
root - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:32:13 [DEBUG] Starting graph walk: walkPlanDestroy | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.output.permission_set_name (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": produced no dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_name (expand)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": produced no dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:13 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.output.permission_set_arn (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": produced no dynamic subgraph | |
2021-05-03T01:32:13.183-0300 [INFO] plugin: configuring client automatic mTLS | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.output.permission_set_arn (expand)": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.output.policy_json (expand)" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": starting visit (*terraform.nodeExpandOutput) | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": expanding dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": produced no dynamic subgraph | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.output.policy_json (expand)": visit complete | |
2021-05-03T01:32:13.297-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5] | |
2021-05-03T01:32:13.339-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 pid=30702 | |
2021-05-03T01:32:13.339-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 | |
2021-05-03T01:32:13.397-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:32:13.397-0300 | |
2021-05-03T01:32:13.541-0300 [DEBUG] plugin.terraform-provider-aws_v3.38.0_x5: plugin address: network=unix address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin414341189 timestamp=2021-05-03T01:32:13.541-0300 | |
2021-05-03T01:32:13.541-0300 [DEBUG] plugin: using plugin: version=5 | |
2021/05/03 01:32:13 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:13 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: GetSchema | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021-05-03T01:32:13.768-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy" | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:13 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:13 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies": visit complete | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies": visit complete | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:13 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion": visit complete | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]" | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]" | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:13 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy": visit complete | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:13 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:13 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:13 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:13 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:13 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]": visit complete | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "module.test-provider-1.data.aws_identitystore_group.group[0]" | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.data.aws_identitystore_group.group[0]": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:14 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.data.aws_identitystore_group.group[0]": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy": visit complete | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies" | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:14 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_permission_set.permission-set" | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set.permission-set": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:14 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:14 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_permission_set.permission-set is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:14 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies": visit complete | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set.permission-set": visit complete | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "module.test-provider-1.data.aws_ssoadmin_instances.okta" | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.data.aws_ssoadmin_instances.okta": starting visit (*terraform.NodePlanDestroyableResourceInstance) | |
2021/05/03 01:32:14 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:32:14 [TRACE] EvalWriteDiff: recorded Delete change for module.test-provider-1.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.data.aws_ssoadmin_instances.okta": visit complete | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021/05/03 01:32:14 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:32:14 [TRACE] GRPCProvider: Close | |
2021-05-03T01:32:14.386-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:32:14.393-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 pid=30702 | |
2021-05-03T01:32:14.393-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:32:14 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "root" | |
2021/05/03 01:32:14 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:32:14 [TRACE] vertex "root": visit complete | |
2021/05/03 01:32:14 [INFO] backend/local: apply calling Apply | |
2021/05/03 01:32:14 [INFO] terraform: building graph: GraphTypeApply | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021/05/03 01:32:14 [TRACE] ConfigTransformer: Starting for path: | |
2021/05/03 01:32:14 [TRACE] ConfigTransformer: Starting for path: module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ConfigTransformer: Starting for path: module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021/05/03 01:32:14 [TRACE] OutputTransformer: adding policy_json as *terraform.nodeExpandOutput | |
2021/05/03 01:32:14 [TRACE] OutputTransformer: adding aws_managed_policies as *terraform.nodeExpandOutput | |
2021/05/03 01:32:14 [TRACE] OutputTransformer: adding permission_set_arn as *terraform.nodeExpandOutput | |
2021/05/03 01:32:14 [TRACE] OutputTransformer: adding permission_set_name as *terraform.nodeExpandOutput | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.DiffTransformer | |
2021/05/03 01:32:14 [TRACE] DiffTransformer starting | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless will be represented for destruction by module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies will be represented for destruction by module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies will be represented for destruction by module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion will be represented for destruction by module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy will be represented for destruction by module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies will be represented for destruction by module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] will be represented for destruction by module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] will be represented for destruction by module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] will be represented for destruction by module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] will be represented for destruction by module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] will be represented for destruction by module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] will be represented for destruction by module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] will be represented for destruction by module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.data.aws_identitystore_group.group[0] will be represented for destruction by module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] will be represented for destruction by module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy will be represented for destruction by module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies will be represented for destruction by module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set will be represented for destruction by module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: found Delete change for module.test-provider-1.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:32:14 [TRACE] DiffTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta will be represented for destruction by module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) | |
2021/05/03 01:32:14 [TRACE] DiffTransformer complete | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.DiffTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/default_allow_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1/main.tf", Start:hcl.Pos{Line:26, Column:1, Byte:721}, End:hcl.Pos{Line:26, Column:37, Byte:757}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.data.aws_identitystore_group.group (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1/main.tf", Start:hcl.Pos{Line:28, Column:1, Byte:762}, End:hcl.Pos{Line:28, Column:39, Byte:800}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.data.aws_identitystore_group.group (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/default_deny_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:55, Byte:54}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:67,1-77 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:21, Column:1, Byte:506}, End:hcl.Pos{Line:21, Column:64, Byte:569}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/custom_arns_policies.tf", Start:hcl.Pos{Line:10, Column:1, Byte:303}, End:hcl.Pos{Line:10, Column:52, Byte:354}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.data.aws_ssoadmin_instances.okta (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1/main.tf", Start:hcl.Pos{Line:26, Column:1, Byte:721}, End:hcl.Pos{Line:26, Column:37, Byte:757}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/main.tf", Start:hcl.Pos{Line:2, Column:1, Byte:36}, End:hcl.Pos{Line:2, Column:53, Byte:88}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.null_resource.check_valid_account (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-1/validations.tf:5,1-47 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.null_resource.check_valid_account (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1/main.tf", Start:hcl.Pos{Line:28, Column:1, Byte:762}, End:hcl.Pos{Line:28, Column:39, Byte:800}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-1/main.tf:67,1-77 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:12, Column:1, Byte:232}, End:hcl.Pos{Line:12, Column:71, Byte:302}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:12, Column:1, Byte:232}, End:hcl.Pos{Line:12, Column:71, Byte:302}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:8, Column:1, Byte:119}, End:hcl.Pos{Line:8, Column:56, Byte:174}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:38,1-56 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-1/main.tf:38,1-56 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/default_allow_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:56, Byte:55}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:21, Column:1, Byte:506}, End:hcl.Pos{Line:21, Column:64, Byte:569}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand)" (*terraform.nodeExpandApplyableResource) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/main.tf", Start:hcl.Pos{Line:2, Column:1, Byte:36}, End:hcl.Pos{Line:2, Column:53, Byte:88}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/default_deny_policies.tf", Start:hcl.Pos{Line:1, Column:1, Byte:0}, End:hcl.Pos{Line:1, Column:55, Byte:54}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:45,1-74 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/shared_policies_definitions.tf", Start:hcl.Pos{Line:8, Column:1, Byte:119}, End:hcl.Pos{Line:8, Column:56, Byte:174}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" (*terraform.NodeDestroyResourceInstance) config from .terraform/modules/test-provider-1/main.tf:73,1-69 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand)" (*terraform.nodeExpandApplyableResource) config from .terraform/modules/test-provider-1/main.tf:45,1-74 | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching to "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" (*terraform.NodeDestroyResourceInstance) config from hcl.Range{Filename:".terraform/modules/test-provider-1.role-policies/custom_arns_policies.tf", Start:hcl.Pos{Line:10, Column:1, Byte:303}, End:hcl.Pos{Line:10, Column:52, Byte:354}} | |
2021/05/03 01:32:14 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021/05/03 01:32:14 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from provider.tf:1,1-15 | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021/05/03 01:32:14 [DEBUG] adding implicit provider configuration provider["registry.terraform.io/hashicorp/null"], implied first by module.test-provider-1.null_resource.check_valid_account (expand) | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.data.aws_identitystore_group.group (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.data.aws_identitystore_group.group (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.null_resource.check_valid_account (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.null_resource.check_valid_account (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: looking for module.test-provider-1.provider["registry.terraform.io/hashicorp/aws"] to serve module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] ProviderTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) uses inherited configuration provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [DEBUG] ProviderTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" (*terraform.NodeDestroyResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2021/05/03 01:32:14 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.null_resource.check_valid_account (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.data.aws_identitystore_group.group (expand) | |
2021/05/03 01:32:14 [TRACE] AttachSchemaTransformer: attaching resource schema to module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: Added module.test-provider-1 as *terraform.nodeExpandModule | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1 (close) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.dynamo_tables_names (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.allowed_resources (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.null_resource.check_valid_account (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.custom_policy_json (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.okta_groups (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.output.permission_set_name (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.aws_account (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.okta_groups (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.buckets_arn (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.sre_okta_group (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.output.permission_set_arn (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.dynamo_tables_arn (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.aws_accounts (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.sso_role_name (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.product_name (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.lambdas_arn (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.local.validate_account (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.aws_account_alias (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.data.aws_identitystore_group.group (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.lambdas_names (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.environment (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.buckets_names (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.var.shared_policies (expand) must wait for expansion of module.test-provider-1 | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: Added module.test-provider-1.module.role-policies as *terraform.nodeExpandModule | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies (expand) must wait for expansion of module.test-provider-1 (expand) | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.output.policy_json (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.var.custom_policy_json (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.var.role_name (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.all_arns (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.bucket_objects (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.shared_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.var.shared_policies (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies (close) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.var.custom_arns (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] ModuleExpansionTransformer: module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) must wait for expansion of module.test-provider-1.module.role-policies | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer with new graph: | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1 (close)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.dynamo_tables_names (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.allowed_resources (expand)" references: [module.test-provider-1.local.buckets_arn (expand) module.test-provider-1.local.lambdas_arn (expand) module.test-provider-1.local.dynamo_tables_arn (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.null_resource.check_valid_account (expand)" references: [module.test-provider-1.local.validate_account (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.var.custom_policy_json (expand)" references: [module.test-provider-1.var.custom_policy_json (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.var.role_name (expand)" references: [module.test-provider-1.local.sso_role_name (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)" references: [module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.bucket_objects (expand)" references: [module.test-provider-1.module.role-policies.var.custom_arns (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.all_arns (expand)" references: [module.test-provider-1.module.role-policies.local.bucket_objects (expand) module.test-provider-1.module.role-policies.var.custom_arns (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.custom_policy_json (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.okta_groups (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.shared_policies (expand)" references: [module.test-provider-1.module.role-policies.var.shared_policies (expand) module.test-provider-1.module.role-policies.local.shared_policies_struct (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.output.permission_set_name (expand)" references: [module.test-provider-1.local.sso_role_name (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand)" references: [module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.aws_account (expand)" references: [module.test-provider-1.local.aws_accounts (expand) module.test-provider-1.var.aws_account_alias (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/null\"]" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.var.shared_policies (expand)" references: [module.test-provider-1.var.shared_policies (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies (close)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.okta_groups (expand)" references: [module.test-provider-1.var.okta_groups (expand) module.test-provider-1.local.sre_okta_group (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.buckets_arn (expand)" references: [module.test-provider-1.var.buckets_names (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.sre_okta_group (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.var.custom_arns (expand)" references: [module.test-provider-1.local.allowed_resources (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand)" references: [module.test-provider-1.module.role-policies.var.custom_arns (expand) module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.output.permission_set_arn (expand)" references: [module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.dynamo_tables_arn (expand)" references: [module.test-provider-1.var.dynamo_tables_names (expand) module.test-provider-1.local.aws_account (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.aws_accounts (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.sso_role_name (expand)" references: [module.test-provider-1.var.product_name (expand) module.test-provider-1.var.environment (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1 (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.product_name (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.lambdas_arn (expand)" references: [module.test-provider-1.var.lambdas_names (expand) module.test-provider-1.local.aws_account (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.local.validate_account (expand)" references: [module.test-provider-1.local.aws_accounts (expand) module.test-provider-1.var.aws_account_alias (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand)" references: [module.test-provider-1.local.okta_groups (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.aws_account_alias (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.data.aws_identitystore_group.group (expand)" references: [module.test-provider-1.local.okta_groups (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.lambdas_names (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.environment (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.buckets_names (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.output.aws_managed_policies (expand)" references: [module.test-provider-1.module.role-policies.local.aws_managed_policies (expand)] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.var.shared_policies (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand)" references: [] | |
2021/05/03 01:32:14 [DEBUG] ReferenceTransformer: "module.test-provider-1.module.role-policies.output.policy_json (expand)" references: [module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand)] | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] ForcedCBDTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" (*terraform.NodeDestroyResourceInstance) has no CBD descendent, so skipping | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.data.aws_ssoadmin_instances.okta | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_permission_set.permission-set | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" (*terraform.NodeDestroyResourceInstance) destroys module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] DestroyEdgeTransformer: module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) has stored dependency of module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer with new graph: | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.buckets_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.dynamo_tables_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.lambdas_arn (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.okta_groups (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sre_okta_group (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.aws_accounts (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.local.all_arns (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.bucket_objects (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies.output.policy_json (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.module.role-policies.var.custom_arns (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.allowed_resources (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies.var.role_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.module.role-policies.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.module.role-policies (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1.null_resource.check_valid_account (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.validate_account (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.output.permission_set_arn (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) - *terraform.nodeExpandApplyableResource | |
module.test-provider-1.output.permission_set_name (expand) - *terraform.nodeExpandOutput | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.local.sso_role_name (expand) - *terraform.nodeExpandLocal | |
module.test-provider-1.var.aws_account_alias (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.buckets_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.custom_policy_json (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.dynamo_tables_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.environment (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.lambdas_names (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.okta_groups (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.product_name (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
module.test-provider-1.var.shared_policies (expand) - *terraform.nodeExpandModuleVariable | |
module.test-provider-1 (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.CBDEdgeTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.CBDEdgeTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.pruneUnusedNodesTransformer | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.output.policy_json (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.data.aws_ssoadmin_instances.okta (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.null_resource.check_valid_account (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.var.custom_policy_json (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.var.role_name (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.local.all_arns (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.custom_policy_json (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.local.shared_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.output.permission_set_name (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.var.shared_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.local.custom_arn_policy_json (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.output.permission_set_arn (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.sso_role_name (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.shared_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.output.aws_managed_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.environment (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.local.bucket_objects (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.data.aws_identitystore_group.group (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.local.shared_policies_struct (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.local.aws_managed_policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.aws_ssoadmin_permission_set.permission-set (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.okta_groups (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.sre_okta_group (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.okta_groups (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.product_name (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.validate_account (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies.var.custom_arns (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.allowed_resources (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.dynamo_tables_arn (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.module.role-policies (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.buckets_arn (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.buckets_names (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.dynamo_tables_names (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.lambdas_arn (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.aws_account (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.lambdas_names (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.var.aws_account_alias (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1.local.aws_accounts (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [DEBUG] pruneUnusedNodes: module.test-provider-1 (expand) is no longer needed, removing | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.pruneUnusedNodesTransformer with new graph: | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:32:14 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021/05/03 01:32:14 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
module.test-provider-1 (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies (close) - *terraform.nodeCloseModule | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
module.test-provider-1.data.aws_identitystore_group.group[0] (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy) - *terraform.NodeDestroyResourceInstance | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
provider["registry.terraform.io/hashicorp/null"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021/05/03 01:32:14 [DEBUG] Starting graph walk: walkDestroy | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies (close)" | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.module.role-policies (close)": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1.module.role-policies (close)": visit complete | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:14 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-05-03T01:32:14.465-0300 [INFO] plugin: configuring client automatic mTLS | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "module.test-provider-1 (close)" | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1 (close)": starting visit (*terraform.nodeCloseModule) | |
2021/05/03 01:32:14 [TRACE] vertex "module.test-provider-1 (close)": visit complete | |
2021/05/03 01:32:14 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/null\"]" | |
2021/05/03 01:32:14 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-05-03T01:32:14.703-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5] | |
2021-05-03T01:32:14.754-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 pid=30707 | |
2021-05-03T01:32:14.754-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 | |
2021-05-03T01:32:14.871-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:32:14.871-0300 | |
2021-05-03T01:32:15.084-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:32:15.084-0300 [DEBUG] plugin.terraform-provider-aws_v3.38.0_x5: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin040352502 network=unix timestamp=2021-05-03T01:32:15.084-0300 | |
2021/05/03 01:32:15 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021/05/03 01:32:15 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021/05/03 01:32:15 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:32:15.216-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021-05-03T01:32:15.216-0300 [INFO] plugin: configuring client automatic mTLS | |
2021-05-03T01:32:15.369-0300 [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5] | |
2021-05-03T01:32:15.386-0300 [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30710 | |
2021-05-03T01:32:15.387-0300 [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 | |
2021-05-03T01:32:15.395-0300 [INFO] plugin.terraform-provider-null_v3.1.0_x5: configuring server automatic mTLS: timestamp=2021-05-03T01:32:15.395-0300 | |
2021-05-03T01:32:15.492-0300 [DEBUG] plugin: using plugin: version=5 | |
2021-05-03T01:32:15.492-0300 [DEBUG] plugin.terraform-provider-null_v3.1.0_x5: plugin address: address=/var/folders/12/gpnvvy3s19v7m2jjt1vrgy100000gn/T/plugin103042061 network=unix timestamp=2021-05-03T01:32:15.490-0300 | |
2021/05/03 01:32:15 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/null\"]" provider for provider["registry.terraform.io/hashicorp/null"] | |
2021/05/03 01:32:15 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/null"]: no configuration at all | |
2021/05/03 01:32:15 [TRACE] GRPCProvider: GetSchema | |
2021-05-03T01:32:15.616-0300 [TRACE] plugin.stdio: waiting for stdio data | |
2021/05/03 01:32:15 [TRACE] GRPCProvider: Configure | |
2021/05/03 01:32:15 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"]": visit complete | |
2021/05/03 01:32:15 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/null\"] (close)" | |
2021/05/03 01:32:15 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021/05/03 01:32:15 [TRACE] GRPCProvider: Close | |
2021-05-03T01:32:15.671-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/null/3.1.0/darwin_amd64/terraform-provider-null_v3.1.0_x5 pid=30710 | |
2021-05-03T01:32:15.671-0300 [DEBUG] plugin: plugin exited | |
2021/05/03 01:32:15 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/null\"] (close)": visit complete | |
2021-05-03T01:32:15.672-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021/05/03 01:32:15 [TRACE] GRPCProvider: Configure | |
2021-05-03T01:32:15.922-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:15 [INFO] Attempting to use session-derived credentials: timestamp=2021-05-03T01:32:15.922-0300 | |
2021-05-03T01:32:17.401-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:17 [INFO] Successfully derived credentials from session: timestamp=2021-05-03T01:32:17.401-0300 | |
2021-05-03T01:32:17.401-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:17 [INFO] AWS Auth provider used: "SSOProvider": timestamp=2021-05-03T01:32:17.401-0300 | |
2021-05-03T01:32:17.402-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:17 [DEBUG] Trying to get account information via sts:GetCallerIdentity: timestamp=2021-05-03T01:32:17.402-0300 | |
2021-05-03T01:32:17.403-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:17 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sts.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 43 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=cfa2ae027d0cd0ec8e6b7682dfaa3ca90fd7e1dea5d9267a98794fdbb3eb34d6 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210503T043217Z | |
X-Amz-Security-Token: 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 | |
Accept-Encoding: gzip | |
Action=GetCallerIdentity&Version=2011-06-15 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:17.403-0300 | |
2021-05-03T01:32:18.251-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:18 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 510 | |
Content-Type: text/xml | |
Date: Mon, 03 May 2021 04:32:17 GMT | |
X-Amzn-Requestid: fdccc01e-00a6-45a1-8236-f9be6709cf75 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:18.251-0300 | |
2021-05-03T01:32:18.251-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:18 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
<GetCallerIdentityResult> | |
<Arn>arn:aws:sts::797740695898:assumed-role/AWSReservedSSO_1-sre-admin_542df63bbfb998fa/[email protected]</Arn> | |
<UserId>AROA3TPINAFNERIQUXSEL:[email protected]</UserId> | |
<Account>797740695898</Account> | |
</GetCallerIdentityResult> | |
<ResponseMetadata> | |
<RequestId>fdccc01e-00a6-45a1-8236-f9be6709cf75</RequestId> | |
</ResponseMetadata> | |
</GetCallerIdentityResponse>: timestamp=2021-05-03T01:32:18.251-0300 | |
2021-05-03T01:32:18.252-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:18 [DEBUG] Trying to get account information via sts:GetCallerIdentity: timestamp=2021-05-03T01:32:18.251-0300 | |
2021-05-03T01:32:18.252-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:18 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sts.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 43 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=ec8460eb02c767f0a270b9314e9c7147d03011eb40198b79d8d72928d724f3d6 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210503T043218Z | |
X-Amz-Security-Token: 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 | |
Accept-Encoding: gzip | |
Action=GetCallerIdentity&Version=2011-06-15 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:18.252-0300 | |
2021-05-03T01:32:18.938-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:18 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 510 | |
Content-Type: text/xml | |
Date: Mon, 03 May 2021 04:32:18 GMT | |
X-Amzn-Requestid: 159e086c-8966-44ef-9752-af80c6ea2234 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:18.937-0300 | |
2021-05-03T01:32:18.938-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:18 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
<GetCallerIdentityResult> | |
<Arn>arn:aws:sts::797740695898:assumed-role/AWSReservedSSO_1-sre-admin_542df63bbfb998fa/[email protected]</Arn> | |
<UserId>AROA3TPINAFNERIQUXSEL:[email protected]</UserId> | |
<Account>797740695898</Account> | |
</GetCallerIdentityResult> | |
<ResponseMetadata> | |
<RequestId>159e086c-8966-44ef-9752-af80c6ea2234</RequestId> | |
</ResponseMetadata> | |
</GetCallerIdentityResponse>: timestamp=2021-05-03T01:32:18.937-0300 | |
2021-05-03T01:32:18.941-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:18 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: ec2.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 87 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=c5feb603e2b635b4327d03134b7b415dda1567e702b08565bc9c8b60960e6850 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210503T043218Z | |
X-Amz-Security-Token: IQoJb3JpZ2luX2VjEFUaCXVzLWVhc3QtMSJIMEYCIQC1xUdHHhwNbc04wYmVf1U/jlzxLZP1d00EyC7uDhTHPQIhAJT2i1nWQ+xUsuLj7jKwTvpoaqshXRcL7QQiQCoATuuNKq8DCM7//////////wEQABoMNzk3NzQwNjk1ODk4Igx1fSu8KdPoDVzx/YgqgwPcw1avobO3+ge0GyhJnCcTeuDlg5LLV1R7nt3bIOlIw9ND9StTFTXSBIp3i2nmihWW/fDtIlX7ou0JjmWSMRxtaGUBMIyoxynI1tuBiQ57MHcIfsqTv1II7F5auXYxD5e8ylPcYtzIs73eNEAap9PqBzORLD4bunF1kldfTV0rAz81k8jTey54ym1X8yd427YZwXlStf7LhD3qzTkxQYphnTQAhgjDLQmZtoT+/NewQPZNAZjBzdMIDBE8uPiP6oDSdmievbUqtHTnzOB7PMinBUFWB3E2T0hKnf2fH8PkNfBoLJ07X5lt/ygGjQWZO+veX/zF2QVjXOR0+gmh5XL1kCp9SJD9jA9dTgb+3Cd47c4EYRDH1adxMTzhvSpg8afZYUdCzsf7IQz1IJAZ4gUsj3kB2gnKAKjxMak/QQKpmA4TDmQ35KHCOf71xaQ6RXdNuejSczh55+VBtpIYwSlUv9pzptX39VRU55ciEePvEBALNGIKDVtGZI9s2P5ArFnzJgsw0fm9hAY6pQFRGVRL2Q+uVBZMeo7EYU9rjTy+sQV5Oyp0Ga6kAwv4DWbcc/NEE8hQWO8jruCPQ76eCWtZzzel+Rfyd4M1GFzc2IcDy8XItO+U6r0gljhsBUtWZBCp7Maot5aiWEuxeebCNbYsbvbm/v2d4+AM0IenPxdJOHZaTwbTLDOalkpjgFmgEmOR2sAHPIF1YML0E5G1qHPKk3zLF/56Z/8McGyuxEkd3Rg= | |
Accept-Encoding: gzip | |
Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:18.941-0300 | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" is waiting for "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021/05/03 01:32:19 [TRACE] dag/walk: vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]" | |
2021-05-03T01:32:19.674-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 644 | |
Cache-Control: no-cache, no-store | |
Content-Type: text/xml;charset=UTF-8 | |
Date: Mon, 03 May 2021 04:32:19 GMT | |
Server: AmazonEC2 | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
X-Amzn-Requestid: bbab629f-69e0-4e1d-80bd-bda19c42e4fe | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.674-0300 | |
2021-05-03T01:32:19.674-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
<DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
<requestId>bbab629f-69e0-4e1d-80bd-bda19c42e4fe</requestId> | |
<accountAttributeSet> | |
<item> | |
<attributeName>supported-platforms</attributeName> | |
<attributeValueSet> | |
<item> | |
<attributeValue>EC2</attributeValue> | |
</item> | |
<item> | |
<attributeValue>VPC</attributeValue> | |
</item> | |
</attributeValueSet> | |
</item> | |
</accountAttributeSet> | |
</DescribeAccountAttributesResponse>: timestamp=2021-05-03T01:32:19.674-0300 | |
2021/05/03 01:32:19 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]: Destroying... [id=arn:aws:iam::aws:policy/AmazonRoute53ReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021-05-03T01:32:19.680-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 230 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=9b4e6ee66bcb4d0aaa022d8459f1c2dff18e403f3993fd2d7b055bf128dcf2a2 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AmazonRoute53ReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.680-0300 | |
2021/05/03 01:32:19 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)" | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: creating backup snapshot at terraform.tfstate.backup | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 434 | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_shared_policies (destroy)": visit complete | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]: Destroying... [id=906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e,GROUP,797740695898,AWS_ACCOUNT,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]: Destroying... [id=arn:aws:iam::aws:policy/AmazonVPCReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 435 | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021-05-03T01:32:19.713-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 226 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=5f62fc9e6f1d897607f05d61d629f12cf3e74b725495b0f0f26b539ba0099686 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: IQoJb3JpZ2luX2VjEFUaCXVzLWVhc3QtMSJIMEYCIQC1xUdHHhwNbc04wYmVf1U/jlzxLZP1d00EyC7uDhTHPQIhAJT2i1nWQ+xUsuLj7jKwTvpoaqshXRcL7QQ[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]: Destroying... [id=arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]: Destroying... [id=arn:aws:iam::aws:policy/AWSCertificateManagerReadOnly,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]: Destroying... [id=arn:aws:iam::aws:policy/job-function/SupportUser,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]: Destroying... [id=arn:aws:iam::aws:policy/AmazonMSKReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AmazonMSKReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.711-0300 | |
2021-05-03T01:32:19.713-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DeleteAccountAssignment Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 298 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=0b8412e41060b98ab93e9a1c4351bacaa9253a548fabe824d59bc02f09cad7a2 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DeleteAccountAssignment | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.712-0300 | |
2021-05-03T01:32:19.713-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 226 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=cdb5a1cc845a6d2880954c8b9e32fed4004426916059817979593ad409acf9f4 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AmazonVPCReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.712-0300 | |
2021-05-03T01:32:19.713-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 227 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=1d02b0a7a9e0e44d6db80ea6a8ecc0cfd11a9721b92627711e9b45cd952e1420 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.712-0300 | |
2021-05-03T01:32:19.713-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 232 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=b49debe6646bd30dbd8aa301e2d8fabfd030c0233b286010d3c93eef24e6e2f9 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/AWSCertificateManagerReadOnly","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.712-0300 | |
2021-05-03T01:32:19.713-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 227 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=20bd8df7a93c7de5ae73bf1453671fc6bbb0e35027af89a8fbe2842cfbf6dcf7 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: 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 | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/job-function/SupportUser","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.712-0300 | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.custom_arns_policy (destroy)": visit complete | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:19 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies | |
2021/05/03 01:32:19 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 436 | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_allow_policies (destroy)": visit complete | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 437 | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionBlessVaultBastion (destroy)": visit complete | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]: Destroying... [id=arn:aws:iam::aws:policy/ServiceQuotasReadOnlyAccess,arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021-05-03T01:32:19.807-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 230 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=93a5ed5e839eebbc3196d60dc28561ab2ad083119fd782f2e58720e775b76e19 | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: IQoJb3JpZ2luX2VjEFUaCXVzLWVhc3QtMSJIMEYCIQC1xUdHHhwNbc04wYmVf1U/jlzxLZP1d00EyC7uDhTHPQIhAJT2i1nWQ+xUsuLj7jKwTvpoaqshXRcL7QQiQCoATuuNKq8DCM7//////////wEQABoMNzk3NzQwNjk1ODk4Igx1fSu8KdPoDVzx/YgqgwPcw1avobO3+ge0GyhJnCcTeuDlg5LLV1R7nt3bIOlIw9ND9StTFTXSBIp3i2nmihWW/fDtIlX7ou0JjmWSMRxtaGUBMIyoxynI1tuBiQ57MHcIfsqTv1II7F5auXYxD5e8ylPcYtzIs73eNEAap9PqBzORLD4bunF1kldfTV0rAz81k8jTey54ym1X8yd427YZwXlStf7LhD3qzTkxQYphnTQAhgjDLQmZtoT+/NewQPZNAZjBzdMIDBE8uPiP6oDSdmievbUqtHTnzOB7PMinBUFWB3E2T0hKnf2fH8PkNfBoLJ07X5lt/ygGjQWZO+veX/zF2QVjXOR0+gmh5XL1kCp9SJD9jA9dTgb+3Cd47c4EYRDH1adxMTzhvSpg8afZYUdCzsf7IQz1IJAZ4gUsj3kB2gnKAKjxMak/QQKpmA4TDmQ35KHCOf71xaQ6RXdNuejSczh55+VBtpIYwSlUv9pzptX39VRU55ciEePvEBALNGIKDVtGZI9s2P5ArFnzJgsw0fm9hAY6pQFRGVRL2Q+uVBZMeo7EYU9rjTy+sQV5Oyp0Ga6kAwv4DWbcc/NEE8hQWO8jruCPQ76eCWtZzzel+Rfyd4M1GFzc2IcDy8XItO+U6r0gljhsBUtWZBCp7Maot5aiWEuxeebCNbYsbvbm/v2d4+AM0IenPxdJOHZaTwbTLDOalkpjgFmgEmOR2sAHPIF1YML0E5G1qHPKk3zLF/56Z/8McGyuxEkd3Rg= | |
X-Amz-Target: SWBExternalService.DetachManagedPolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","ManagedPolicyArn":"arn:aws:iam::aws:policy/ServiceQuotasReadOnlyAccess","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.806-0300 | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 438 | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.default_deny_policies (destroy)": visit complete | |
2021/05/03 01:32:19 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:19 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:19 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless | |
2021/05/03 01:32:19 [TRACE] UpgradeResourceState: schema version of module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy is still 0; calling provider "aws" for any other minor fixups | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: UpgradeResourceState | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:19 [DEBUG] EvalApply: ProviderMeta config value set | |
2021/05/03 01:32:19 [DEBUG] module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy: applying the planned Delete change | |
2021/05/03 01:32:19 [TRACE] GRPCProvider: ApplyResourceChange | |
2021-05-03T01:32:19.837-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:19 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DeleteInlinePolicyFromPermissionSet Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 157 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=3142afe8025d998277accbb97fec719e02756dc09ad890ec2c3c870b6f95af9f | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043219Z | |
X-Amz-Security-Token: IQoJb3JpZ2luX2VjEFUaCXVzLWVhc3QtMSJIMEYCIQC1xUdHHhwNbc04wYmVf1U/jlzxLZP1d00EyC7uDhTHPQIhAJT2i1nWQ+xUsuLj7jKwTvpoaqshXRcL7QQiQCoATuuNKq8DCM7//////////wEQABoMNzk3NzQwNjk1ODk4Igx1fSu8KdPoDVzx/YgqgwPcw1avobO3+ge0GyhJnCcTeuDlg5LLV1R7nt3bIOlIw9ND9StTFTXSBIp3i2nmihWW/fDtIlX7ou0JjmWSMRxtaGUBMIyoxynI1tuBiQ57MHcIfsqTv1II7F5auXYxD5e8ylPcYtzIs73eNEAap9PqBzORLD4bunF1kldfTV0rAz81k8jTey54ym1X8yd427YZwXlStf7LhD3qzTkxQYphnTQAhgjDLQmZtoT+/NewQPZNAZjBzdMIDBE8uPiP6oDSdmievbUqtHTnzOB7PMinBUFWB3E2T0hKnf2fH8PkNfBoLJ07X5lt/ygGjQWZO+veX/zF2QVjXOR0+gmh5XL1kCp9SJD9jA9dTgb+3Cd47c4EYRDH1adxMTzhvSpg8afZYUdCzsf7IQz1IJAZ4gUsj3kB2gnKAKjxMak/QQKpmA4TDmQ35KHCOf71xaQ6RXdNuejSczh55+VBtpIYwSlUv9pzptX39VRU55ciEePvEBALNGIKDVtGZI9s2P5ArFnzJgsw0fm9hAY6pQFRGVRL2Q+uVBZMeo7EYU9rjTy+sQV5Oyp0Ga6kAwv4DWbcc/NEE8hQWO8jruCPQ76eCWtZzzel+Rfyd4M1GFzc2IcDy8XItO+U6r0gljhsBUtWZBCp7Maot5aiWEuxeebCNbYsbvbm/v2d4+AM0IenPxdJOHZaTwbTLDOalkpjgFmgEmOR2sAHPIF1YML0E5G1qHPKk3zLF/56Z/8McGyuxEkd3Rg= | |
X-Amz-Target: SWBExternalService.DeleteInlinePolicyFromPermissionSet | |
Accept-Encoding: gzip | |
{"InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a","PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:19.836-0300 | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy: Destroying... [id=arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156,arn:aws:sso:::instance/ssoins-7223f43a8b17208a][0m[0m | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 439 | |
2021/05/03 01:32:19 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:19 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.LambdaInvokeFunctionInfraBless (destroy)": visit complete | |
2021-05-03T01:32:20.417-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: 4ed81a17-e4a3-42d4-b0cd-ba63e9331be6 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.417-0300 | |
2021-05-03T01:32:20.417-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:32:20.417-0300 | |
2021/05/03 01:32:20 [TRACE] EvalWriteState: removing state object for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1]: Destruction complete after 0s[0m[0m | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 440 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:20 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[1] (destroy)": visit complete | |
2021-05-03T01:32:20.494-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: 24cd57e7-a341-44c0-9c76-acdaa50be1f5 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.494-0300 | |
2021-05-03T01:32:20.494-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:32:20.494-0300 | |
2021/05/03 01:32:20 [TRACE] EvalWriteState: removing state object for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2]: Destruction complete after 0s[0m[0m | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 441 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:20 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[2] (destroy)": visit complete | |
2021-05-03T01:32:20.578-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: caebfd6d-35d3-4e26-b990-28bafa2390fd | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.578-0300 | |
2021-05-03T01:32:20.578-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:32:20.578-0300 | |
2021/05/03 01:32:20 [TRACE] EvalWriteState: removing state object for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4]: Destruction complete after 1s[0m[0m | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 442 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:20 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[4] (destroy)": visit complete | |
2021-05-03T01:32:20.632-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: bafb05b3-bba9-4250-8af5-5d2c9b5c9c87 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.631-0300 | |
2021-05-03T01:32:20.632-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:32:20.631-0300 | |
2021/05/03 01:32:20 [TRACE] EvalWriteState: removing state object for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0]: Destruction complete after 1s[0m[0m | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 443 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:20 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[0] (destroy)": visit complete | |
2021/05/03 01:32:20 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021-05-03T01:32:20.674-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DeleteAccountAssignment Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 345 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: a7b85a87-9a96-434f-8e8d-bd91ed1d9202 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.673-0300 | |
2021-05-03T01:32:20.674-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {"AccountAssignmentDeletionStatus":{"PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","RequestId":"a7b85a87-9a96-434f-8e8d-bd91ed1d9202","Status":"IN_PROGRESS","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"}}: timestamp=2021-05-03T01:32:20.673-0300 | |
2021-05-03T01:32:20.674-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] Waiting for state to become: [SUCCEEDED]: timestamp=2021-05-03T01:32:20.674-0300 | |
2021-05-03T01:32:20.777-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: ca875245-e8ba-46c1-90dd-b61c41c8d855 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.777-0300 | |
2021-05-03T01:32:20.777-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:32:20.777-0300 | |
2021/05/03 01:32:20 [TRACE] EvalWriteState: removing state object for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6]: Destruction complete after 1s[0m[0m | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 444 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:20 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[6] (destroy)": visit complete | |
2021/05/03 01:32:20 [TRACE] EvalWriteState: removing state object for module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021-05-03T01:32:20.926-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DeleteInlinePolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: 8611cc8a-1c26-4e35-8192-04c9a92fdc10 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.925-0300 | |
2021-05-03T01:32:20.926-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:32:20.925-0300 | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy: Destruction complete after 1s[0m[0m | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 445 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:20 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_permission_set_inline_policy.permission-set-policy (destroy)": visit complete | |
2021/05/03 01:32:20 [TRACE] dag/walk: visiting "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)" | |
2021/05/03 01:32:20 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:20 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:20 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:20 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies | |
2021/05/03 01:32:20 [TRACE] states.SyncState: pruning module.test-provider-1.module.role-policies because it is empty | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 446 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:20 [TRACE] vertex "module.test-provider-1.module.role-policies.data.aws_iam_policy_document.merged_all_policies (destroy)": visit complete | |
2021-05-03T01:32:20.985-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 400 Bad Request | |
Content-Length: 87 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: cf835a3b-e900-481f-9f01-ebd74bfdadeb | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.984-0300 | |
2021-05-03T01:32:20.985-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {"__type":"ConflictException","Message":"There is a conflicting operation in process."}: timestamp=2021-05-03T01:32:20.984-0300 | |
2021-05-03T01:32:20.988-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DetachManagedPolicyFromPermissionSet Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 2 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:20 GMT | |
X-Amzn-Requestid: 001a259b-fb49-4da9-9d0a-d24373815180 | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:20.984-0300 | |
2021/05/03 01:32:20 [TRACE] EvalWriteState: removing state object for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:20 [DEBUG] module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5]: apply errored, but we're indicating that via the Error pointer rather than returning it: error detaching Managed Policy (arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess) from SSO Permission Set (arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156): ConflictException: There is a conflicting operation in process. | |
2021/05/03 01:32:20 [TRACE] EvalWriteState: writing current state object for module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3]: Destruction complete after 1s[0m[0m | |
2021-05-03T01:32:20.989-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] {}: timestamp=2021-05-03T01:32:20.984-0300 | |
2021-05-03T01:32:20.990-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:20 [DEBUG] [aws-sdk-go] DEBUG: Validate Response SSO Admin/DetachManagedPolicyFromPermissionSet failed, attempt 0/25, error ConflictException: There is a conflicting operation in process.: timestamp=2021-05-03T01:32:20.984-0300 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 447 | |
2021/05/03 01:32:20 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:21 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[3] (destroy)": visit complete | |
2021/05/03 01:32:21 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_managed_policy_attachment.managed-policies[5] (destroy)": visit complete | |
2021/05/03 01:32:24 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" | |
2021/05/03 01:32:24 [TRACE] dag/walk: vertex "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" is waiting for "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" | |
2021/05/03 01:32:24 [TRACE] dag/walk: vertex "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)" is waiting for "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021/05/03 01:32:24 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)" | |
2021/05/03 01:32:25 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)" | |
2021-05-03T01:32:25.677-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:25 [DEBUG] [aws-sdk-go] DEBUG: Request SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sso.us-east-1.amazonaws.com | |
User-Agent: APN/1.0 HashiCorp/1.0 Terraform/0.14.7 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) aws-sdk-go/1.38.29 (go1.16; darwin; amd64) | |
Content-Length: 140 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIA3TPINAFNHNCHIYWF/20210503/us-east-1/sso/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token;x-amz-target, Signature=fc4d721ffa8036d955db8c8e31df4d9caf55944cb9c2f774e4cb933cb7c32cbd | |
Content-Type: application/x-amz-json-1.1 | |
X-Amz-Date: 20210503T043225Z | |
X-Amz-Security-Token: IQoJb3JpZ2luX2VjEFUaCXVzLWVhc3QtMSJIMEYCIQC1xUdHHhwNbc04wYmVf1U/jlzxLZP1d00EyC7uDhTHPQIhAJT2i1nWQ+xUsuLj7jKwTvpoaqshXRcL7QQiQCoATuuNKq8DCM7//////////wEQABoMNzk3NzQwNjk1ODk4Igx1fSu8KdPoDVzx/YgqgwPcw1avobO3+ge0GyhJnCcTeuDlg5LLV1R7nt3bIOlIw9ND9StTFTXSBIp3i2nmihWW/fDtIlX7ou0JjmWSMRxtaGUBMIyoxynI1tuBiQ57MHcIfsqTv1II7F5auXYxD5e8ylPcYtzIs73eNEAap9PqBzORLD4bunF1kldfTV0rAz81k8jTey54ym1X8yd427YZwXlStf7LhD3qzTkxQYphnTQAhgjDLQmZtoT+/NewQPZNAZjBzdMIDBE8uPiP6oDSdmievbUqtHTnzOB7PMinBUFWB3E2T0hKnf2fH8PkNfBoLJ07X5lt/ygGjQWZO+veX/zF2QVjXOR0+gmh5XL1kCp9SJD9jA9dTgb+3Cd47c4EYRDH1adxMTzhvSpg8afZYUdCzsf7IQz1IJAZ4gUsj3kB2gnKAKjxMak/QQKpmA4TDmQ35KHCOf71xaQ6RXdNuejSczh55+VBtpIYwSlUv9pzptX39VRU55ciEePvEBALNGIKDVtGZI9s2P5ArFnzJgsw0fm9hAY6pQFRGVRL2Q+uVBZMeo7EYU9rjTy+sQV5Oyp0Ga6kAwv4DWbcc/NEE8hQWO8jruCPQ76eCWtZzzel+Rfyd4M1GFzc2IcDy8XItO+U6r0gljhsBUtWZBCp7Maot5aiWEuxeebCNbYsbvbm/v2d4+AM0IenPxdJOHZaTwbTLDOalkpjgFmgEmOR2sAHPIF1YML0E5G1qHPKk3zLF/56Z/8McGyuxEkd3Rg= | |
X-Amz-Target: SWBExternalService.DescribeAccountAssignmentDeletionStatus | |
Accept-Encoding: gzip | |
{"AccountAssignmentDeletionRequestId":"a7b85a87-9a96-434f-8e8d-bd91ed1d9202","InstanceArn":"arn:aws:sso:::instance/ssoins-7223f43a8b17208a"} | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:25.677-0300 | |
2021/05/03 01:32:26 [TRACE] dag/walk: vertex "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" is waiting for "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)" | |
2021-05-03T01:32:26.405-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:26 [DEBUG] [aws-sdk-go] DEBUG: Response SSO Admin/DescribeAccountAssignmentDeletionStatus Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/2.0 200 OK | |
Content-Length: 374 | |
Content-Type: application/x-amz-json-1.1 | |
Date: Mon, 03 May 2021 04:32:26 GMT | |
X-Amzn-Requestid: 3a2b3e66-363b-458a-b55c-917570892e5f | |
-----------------------------------------------------: timestamp=2021-05-03T01:32:26.405-0300 | |
2021-05-03T01:32:26.405-0300 [INFO] plugin.terraform-provider-aws_v3.38.0_x5: 2021/05/03 01:32:26 [DEBUG] [aws-sdk-go] {"AccountAssignmentDeletionStatus":{"CreatedDate":1.620016340581E9,"PermissionSetArn":"arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156","PrincipalId":"906767d66f-1e8a38dc-71fd-46d4-82a4-fc2d7e71097e","PrincipalType":"GROUP","RequestId":"a7b85a87-9a96-434f-8e8d-bd91ed1d9202","Status":"SUCCEEDED","TargetId":"797740695898","TargetType":"AWS_ACCOUNT"}}: timestamp=2021-05-03T01:32:26.405-0300 | |
2021/05/03 01:32:26 [TRACE] EvalWriteState: removing state object for module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
[0m[1mmodule.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0]: Destruction complete after 6s[0m[0m | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 448 | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:26 [TRACE] vertex "module.test-provider-1.aws_ssoadmin_account_assignment.permission-set-group-account[0] (destroy)": visit complete | |
2021/05/03 01:32:26 [TRACE] dag/walk: visiting "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)" | |
2021/05/03 01:32:26 [TRACE] vertex "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)": starting visit (*terraform.NodeDestroyResourceInstance) | |
2021/05/03 01:32:26 [TRACE] dag/walk: upstream of "module.test-provider-1.aws_ssoadmin_permission_set.permission-set (destroy)" errored, so skipping | |
2021/05/03 01:32:26 [TRACE] dag/walk: upstream of "module.test-provider-1.data.aws_ssoadmin_instances.okta (destroy)" errored, so skipping | |
2021/05/03 01:32:26 [TRACE] EvalReadDiff: Read Delete change from plan for module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:26 [TRACE] ReadResourceInstanceState: reading state for module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:26 [TRACE] NodeDestroyResourceInstance: removing state object for module.test-provider-1.data.aws_identitystore_group.group[0] | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 449 | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2021/05/03 01:32:26 [TRACE] vertex "module.test-provider-1.data.aws_identitystore_group.group[0] (destroy)": visit complete | |
2021/05/03 01:32:26 [TRACE] dag/walk: upstream of "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" errored, so skipping | |
2021/05/03 01:32:26 [TRACE] dag/walk: upstream of "meta.count-boundary (EachMode fixup)" errored, so skipping | |
2021/05/03 01:32:26 [TRACE] dag/walk: upstream of "root" errored, so skipping | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: have already backed up original terraform.tfstate to terraform.tfstate.backup on a previous write | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 450 | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
[31m | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: removing lock metadata file .terraform.tfstate.lock.info | |
2021/05/03 01:32:26 [TRACE] statemgr.Filesystem: unlocking terraform.tfstate using fcntl flock | |
[1m[31mError: [0m[0m[1merror detaching Managed Policy (arn:aws:iam::aws:policy/CloudWatchReadOnlyAccess) from SSO Permission Set (arn:aws:sso:::permissionSet/ssoins-7223f43a8b17208a/ps-95b149f204f28156): ConflictException: There is a conflicting operation in process.[0m | |
[0m[0m[0m | |
2021-05-03T01:32:26.448-0300 [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-05-03T01:32:26.453-0300 [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.38.0/darwin_amd64/terraform-provider-aws_v3.38.0_x5 pid=30707 | |
2021-05-03T01:32:26.453-0300 [DEBUG] plugin: plugin exited |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment