Created
August 28, 2019 07:32
-
-
Save karlroberts/193d04d8c98ed6583926f8c6f046f761 to your computer and use it in GitHub Desktop.
terraform crash
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2019/08/28 17:09:18 [INFO] Terraform version: 0.12.6 | |
2019/08/28 17:09:18 [INFO] Go runtime version: go1.12.4 | |
2019/08/28 17:09:18 [INFO] CLI args: []string{"/usr/local/terraform/0.12.6/terraform", "plan"} | |
2019/08/28 17:09:18 [DEBUG] Attempting to open CLI config file: /home/robertk/.terraformrc | |
2019/08/28 17:09:18 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2019/08/28 17:09:18 [INFO] CLI command args: []string{"plan"} | |
2019/08/28 17:09:18 [TRACE] Meta.Backend: built configuration for "s3" backend with hash value 3758110317 | |
2019/08/28 17:09:18 [TRACE] Preserving existing state lineage "6afd498b-1a91-c1a4-e20b-b257e7469445" | |
2019/08/28 17:09:18 [TRACE] Preserving existing state lineage "6afd498b-1a91-c1a4-e20b-b257e7469445" | |
2019/08/28 17:09:18 [TRACE] Meta.Backend: working directory was previously initialized for "s3" backend | |
2019/08/28 17:09:18 [TRACE] Meta.Backend: using already-initialized, unchanged "s3" backend configuration | |
2019/08/28 17:09:18 [INFO] Setting AWS metadata API timeout to 100ms | |
2019/08/28 17:09:18 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id | |
2019/08/28 17:09:18 [INFO] AWS Auth provider used: "EnvProvider" | |
2019/08/28 17:09:18 [DEBUG] Trying to get account information via sts:GetCallerIdentity | |
2019/08/28 17:09:19 [TRACE] Meta.Backend: instantiated backend of type *s3.Backend | |
2019/08/28 17:09:19 [DEBUG] checking for provider in "." | |
2019/08/28 17:09:19 [DEBUG] checking for provider in "/usr/local/terraform/0.12.6" | |
2019/08/28 17:09:19 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64" | |
2019/08/28 17:09:19 [DEBUG] found provider "terraform-provider-aws_v2.24.0_x4" | |
2019/08/28 17:09:19 [DEBUG] found provider "terraform-provider-local_v1.3.0_x4" | |
2019/08/28 17:09:19 [DEBUG] found valid plugin: "aws", "2.24.0", "/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4" | |
2019/08/28 17:09:19 [DEBUG] found valid plugin: "local", "1.3.0", "/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4" | |
2019/08/28 17:09:19 [DEBUG] checking for provisioner in "." | |
2019/08/28 17:09:19 [DEBUG] checking for provisioner in "/usr/local/terraform/0.12.6" | |
2019/08/28 17:09:19 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64" | |
2019/08/28 17:09:19 [TRACE] Meta.Backend: backend *s3.Backend does not support operations, so wrapping it in a local backend | |
2019/08/28 17:09:19 [INFO] backend/local: starting Plan operation | |
2019/08/28 17:09:19 [TRACE] backend/local: requesting state manager for workspace "default" | |
2019/08/28 17:09:20 [TRACE] backend/local: requesting state lock for workspace "default" | |
2019/08/28 17:09:20 [TRACE] backend/local: reading remote state for workspace "default" | |
2019/08/28 17:09:20 [TRACE] backend/local: retrieving local state snapshot for workspace "default" | |
2019/08/28 17:09:20 [TRACE] backend/local: building context for current working directory | |
2019/08/28 17:09:20 [TRACE] terraform.NewContext: starting | |
2019/08/28 17:09:20 [TRACE] terraform.NewContext: resolving provider version selections | |
2019/08/28 17:09:20 [TRACE] terraform.NewContext: loading provider schemas | |
2019/08/28 17:09:20 [TRACE] LoadSchemas: retrieving schema for provider type "aws" | |
2019-08-28T17:09:20.517+1000 [INFO] plugin: configuring client automatic mTLS | |
2019-08-28T17:09:20.536+1000 [DEBUG] plugin: starting plugin: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 args=[/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4] | |
2019-08-28T17:09:20.537+1000 [DEBUG] plugin: plugin started: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 pid=14949 | |
2019-08-28T17:09:20.537+1000 [DEBUG] plugin: waiting for RPC address: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 | |
2019-08-28T17:09:20.546+1000 [INFO] plugin.terraform-provider-aws_v2.24.0_x4: configuring server automatic mTLS: timestamp=2019-08-28T17:09:20.546+1000 | |
2019-08-28T17:09:20.566+1000 [DEBUG] plugin: using plugin: version=5 | |
2019-08-28T17:09:20.566+1000 [DEBUG] plugin.terraform-provider-aws_v2.24.0_x4: plugin address: network=unix address=/tmp/plugin062203727 timestamp=2019-08-28T17:09:20.566+1000 | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: GetSchema | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: Close | |
2019-08-28T17:09:20.635+1000 [DEBUG] plugin: plugin process exited: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 pid=14949 | |
2019-08-28T17:09:20.635+1000 [DEBUG] plugin: plugin exited | |
2019/08/28 17:09:20 [TRACE] LoadSchemas: retrieving schema for provider type "local" | |
2019-08-28T17:09:20.635+1000 [INFO] plugin: configuring client automatic mTLS | |
2019-08-28T17:09:20.660+1000 [DEBUG] plugin: starting plugin: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 args=[/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4] | |
2019-08-28T17:09:20.660+1000 [DEBUG] plugin: plugin started: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 pid=14968 | |
2019-08-28T17:09:20.660+1000 [DEBUG] plugin: waiting for RPC address: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 | |
2019-08-28T17:09:20.665+1000 [INFO] plugin.terraform-provider-local_v1.3.0_x4: configuring server automatic mTLS: timestamp=2019-08-28T17:09:20.665+1000 | |
2019-08-28T17:09:20.691+1000 [DEBUG] plugin: using plugin: version=5 | |
2019-08-28T17:09:20.691+1000 [DEBUG] plugin.terraform-provider-local_v1.3.0_x4: plugin address: address=/tmp/plugin628022610 network=unix timestamp=2019-08-28T17:09:20.691+1000 | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: GetSchema | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: Close | |
2019-08-28T17:09:20.740+1000 [DEBUG] plugin: plugin process exited: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 pid=14968 | |
2019-08-28T17:09:20.740+1000 [DEBUG] plugin: plugin exited | |
2019/08/28 17:09:20 [TRACE] terraform.NewContext: complete | |
2019/08/28 17:09:20 [TRACE] backend/local: finished building terraform.Context | |
2019/08/28 17:09:20 [TRACE] backend/local: requesting interactive input, if necessary | |
2019/08/28 17:09:20 [TRACE] Context.Input: Prompting for variables | |
2019/08/28 17:09:20 [TRACE] Context.Input: Prompting for provider arguments | |
2019/08/28 17:09:20 [TRACE] Context.Input: Provider provider.aws declared at root.tf:14,1-15 | |
2019/08/28 17:09:20 [TRACE] Context.Input: Provider provider.local implied by resource block at root.tf:61,1-47 | |
2019/08/28 17:09:20 [TRACE] Context.Input: Input for provider.local: map[string]cty.Value{} | |
2019/08/28 17:09:20 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{} | |
2019/08/28 17:09:20 [TRACE] backend/local: running validation operation | |
2019/08/28 17:09:20 [INFO] terraform: building graph: GraphTypeValidate | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: | |
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: cloudtrail-audit | |
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: iam-user-roles | |
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: kms-keys | |
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: kms-policies-roles | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.StateTransformer | |
2019/08/28 17:09:20 [TRACE] StateTransformer: creating nodes for deposed instance objects only | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/role_env_level_assume_matrix.tf:6,1-54 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:167,1-71 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:160,1-74 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "local_file.aws_config_suffix_file" (*terraform.NodeValidatableResource) config from root.tf:61,1-47 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:202,1-71 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.secret_groups" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/role_env_level_assume_matrix.tf:26,1-41 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/role_env_level_assume_matrix.tf:36,1-71 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_role.secret_janitor_role" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:136,1-46 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:184,1-78 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:177,1-80 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:146,1-61 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:139,1-70 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.aws_kms_alias.io_cmk1_alias" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/keys/main.tf:11,1-41 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_kms_alias.root_key_alias_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"root.tf", Start:hcl.Pos{Line:26, Column:1, Byte:512}, End:hcl.Pos{Line:26, Column:44, Byte:555}} | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" (*terraform.NodeValidatableResource) config from ../shared-modules/cloudtrail-audit/main.tf:64,1-51 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/keys/main.tf", Start:hcl.Pos{Line:132, Column:1, Byte:3671}, End:hcl.Pos{Line:132, Column:49, Byte:3719}} | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy.all_secret_policy" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/role_env_level_matrix.tf:72,1-46 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_caller_identity.current" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"root.tf", Start:hcl.Pos{Line:19, Column:1, Byte:294}, End:hcl.Pos{Line:19, Column:37, Byte:330}} | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" (*terraform.NodeValidatableResource) config from ../shared-modules/cloudtrail-audit/main.tf:35,1-44 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/role_env_level_assume_matrix.tf:47,1-62 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:191,1-49 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:34,1-67 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.data.aws_kms_key.io_cmk1_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/keys/main.tf", Start:hcl.Pos{Line:16, Column:1, Byte:317}, End:hcl.Pos{Line:16, Column:35, Byte:351}} | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_role.read_only" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:4,1-36 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/keys/main.tf:127,1-55 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:13,1-49 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" (*terraform.NodeValidatableResource) config from ../shared-modules/cloudtrail-audit/main.tf:98,1-48 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:72,1-63 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:67,1-52 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/kms-policies-roles/main.tf", Start:hcl.Pos{Line:179, Column:1, Byte:5332}, End:hcl.Pos{Line:179, Column:48, Byte:5379}} | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/kms-policies-roles/main.tf", Start:hcl.Pos{Line:175, Column:1, Byte:5226}, End:hcl.Pos{Line:175, Column:52, Byte:5277}} | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" (*terraform.NodeValidatableResource) config from ../shared-modules/cloudtrail-audit/main.tf:5,1-49 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.assume_read_only" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:83,1-45 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/keys/main.tf", Start:hcl.Pos{Line:20, Column:1, Byte:384}, End:hcl.Pos{Line:20, Column:43, Byte:426}} | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/keys/main.tf", Start:hcl.Pos{Line:136, Column:1, Byte:3759}, End:hcl.Pos{Line:136, Column:57, Byte:3815}} | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.read_only_admins" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:153,1-44 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:195,1-73 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_role.admin" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:41,1-32 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/keys/main.tf:25,1-47 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:168,1-72 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:173,1-56 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:115,1-56 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:98,1-78 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:107,1-50 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.admins" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:132,1-34 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.assume_admin" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:99,1-41 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/direct_permissions.tf:4,1-57 | |
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.aws_kms_key.io_cmk1" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/keys/main.tf:4,1-33 | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.RootVariableTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ProvisionerTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2019/08/28 17:09:20 [TRACE] ProviderConfigTransformer: attaching to "provider.aws" provider configuration from root.tf:14,1-15 | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2019/08/28 17:09:20 [DEBUG] adding implicit provider configuration provider.local, implied first by local_file.aws_config_suffix_file | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias is provided by module.kms-keys.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit is provided by module.cloudtrail-audit.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_role.admin is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_key.io_cmk1 is provided by module.kms-keys.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: local_file.aws_config_suffix_file is provided by provider.local or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.admin_group_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: data.aws_kms_alias.root_key_alias_facts is provided by provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail is provided by module.cloudtrail-audit.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts is provided by module.kms-keys.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.all_secret_policy is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_role.read_only is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit is provided by module.cloudtrail-audit.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_read_only is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts is provided by module.kms-keys.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts is provided by module.kms-keys.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.read_only_admins is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 is provided by module.kms-keys.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.secret_janitor_policy is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.admins is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_admin is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_secret_role_policy is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.secret_groups is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_role.secret_janitor_role is provided by module.kms-policies-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_alias.io_cmk1_alias is provided by module.kms-keys.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_key.io_cmk1_facts is provided by module.kms-keys.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: data.aws_caller_identity.current is provided by provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail is provided by module.cloudtrail-audit.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.secret_group_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.class1_kms_key_admins is provided by module.iam-user-roles.provider.aws or inherited equivalent | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: exact match for provider.local serving local_file.aws_config_suffix_file | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "local_file.aws_config_suffix_file" (*terraform.NodeValidatableResource) needs provider.local | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.admins uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.admins" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_key.io_cmk1 uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.aws_kms_key.io_cmk1" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.read_only_admins uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.read_only_admins" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.class1_kms_key_admins uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_admin uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.assume_admin" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.secret_groups uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.secret_groups" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_secret_role_policy uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_alias.io_cmk1_alias uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.aws_kms_alias.io_cmk1_alias" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.all_secret_policy uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.secret_janitor_policy uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_key.io_cmk1_facts uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.data.aws_kms_key.io_cmk1_facts" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_role.admin uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_role.admin" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_role.read_only uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_role.read_only" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.admin_group_membership uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: exact match for provider.aws serving data.aws_caller_identity.current | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "data.aws_caller_identity.current" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: exact match for provider.aws serving data.aws_kms_alias.root_key_alias_facts | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "data.aws_kms_alias.root_key_alias_facts" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_role.secret_janitor_role uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_role.secret_janitor_role" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_read_only uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.assume_read_only" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.secret_group_membership uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin uses inherited configuration provider.aws | |
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" (*terraform.NodeValidatableResource) needs provider.aws | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
provider.local - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer | |
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
provider.local - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.aws | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_role.read_only | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.assume_read_only | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.read_only_admins | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy.secret_janitor_policy | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.local | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.admins | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.assume_admin | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.assume_secret_role_policy | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.secret_groups | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_role.secret_janitor_role | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.aws_kms_alias.io_cmk1_alias | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_caller_identity.current | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.secret_group_membership | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.class1_kms_key_admins | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.data.aws_kms_key.io_cmk1_facts | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_role.admin | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.aws_kms_key.io_cmk1 | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to local_file.aws_config_suffix_file | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.admin_group_membership | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_kms_alias.root_key_alias_facts | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts | |
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy.all_secret_policy | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.var.audit_key_prefix" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.assume_env_level_role_access" references: [var.assume_env_level_role_access] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.read_only_admins" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local.security_levels" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_cloudtrail_alias_name" references: [module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_cloudtrail_key_id" references: [module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" references: [module.iam-user-roles.aws_iam_group.class1_kms_key_admins module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" references: [module.kms-keys.local.account_arns] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" references: [module.kms-policies-roles.aws_iam_policy.secret_janitor_policy module.kms-policies-roles.aws_iam_role.secret_janitor_role] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_roles (orphan)" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_policies (orphan)" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.target_region" references: [var.target_region] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" references: [module.kms-policies-roles.var.target_region module.kms-policies-roles.var.target_account] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "provider.local" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.cloudtrail_key_arn" references: [module.kms-keys.output.aws_kms_cloudtrail_arn] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_arn" references: [module.kms-keys.output.aws_kms_io_root_alias_arn] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.read_actions" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.admins" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.secret_janitor_policy_arn" references: [module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_key_id" references: [module.kms-keys.output.aws_kms_io_root_alias_key_id] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.secProdTupMap" references: [module.kms-policies-roles.local.sec_product_map] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_policy_arns (orphan)" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.secret_roles" references: [module.kms-policies-roles.output.allroles] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.assume_admin" references: [module.iam-user-roles.aws_iam_role.admin] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local.security_envs" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.local.account_arns" references: [module.kms-keys.var.trusted_user_accounts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.class1_secret_kms_keys" references: [data.aws_kms_alias.root_key_alias_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.security_ssm_role" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_alias_name" references: [module.kms-keys.output.aws_kms_io_root_alias_name] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.trusted_user_accounts" references: [local.current_account var.trusted_user_accounts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" references: [module.iam-user-roles.var.env_level_role_matrix module.iam-user-roles.var.secret_roles] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_admin_role" references: [module.kms-policies-roles.output.class1KmsKeyAdminRole_arn] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.write_actions" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.secret_groups" references: [module.iam-user-roles.var.env_level_role_matrix] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_role.secret_janitor_role" references: [module.kms-policies-roles.local.account_arns] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.cloudtrail_key_alias_name" references: [module.kms-keys.output.aws_kms_cloudtrail_alias_name] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.aws_kms_alias.io_cmk1_alias" references: [module.kms-keys.aws_kms_key.io_cmk1] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_io_root_alias_name" references: [module.kms-keys.aws_kms_alias.io_cmk1_alias] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" references: [module.iam-user-roles.var.own_credentials_mfa_managers_users module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" references: [module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" references: [module.iam-user-roles.aws_iam_policy.assume_admin module.iam-user-roles.aws_iam_group.admins] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.assume_env_level_role_access" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.data.aws_kms_key.io_cmk1_facts" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local.sec_product" references: [local.security_envs local.security_levels] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_cloudtrail_state" references: [module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.secret_janitor_policy" references: [module.kms-policies-roles.aws_iam_policy.secret_janitor_policy] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "data.aws_caller_identity.current" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" references: [module.iam-user-roles.var.env_level_role_matrix module.iam-user-roles.var.assume_env_level_role_access module.iam-user-roles.aws_iam_group.secret_groups] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_state" references: [module.kms-keys.output.aws_kms_io_root_cmk1_state] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.env_level_role_matrix" references: [module.kms-policies-roles.output.secProdTupMap] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" references: [module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.ssm_role_actions" references: [module.kms-policies-roles.var.read_actions module.kms-policies-roles.var.write_actions] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.aws_iam_role_arn" references: [module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" references: [module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" references: [module.kms-policies-roles.aws_iam_role.secret_janitor_role module.kms-policies-roles.aws_iam_role.secret_janitor_role] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.class1_key_arns_str" references: [module.kms-policies-roles.var.class1_secret_kms_keys] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.cloudtrail_key_state" references: [module.kms-keys.output.aws_kms_cloudtrail_state] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.target_account" references: [var.target_account] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.cloudtrail_key_key_id" references: [module.kms-keys.output.aws_kms_cloudtrail_key_id] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_role.admin" references: [module.iam-user-roles.local.account_arns] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.local.account_arns" references: [module.iam-user-roles.var.trusted_user_accounts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_rolee_arns (orphan)" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.trusted_user_accounts" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" references: [module.iam-user-roles.var.class1_key_admin_role_arn] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" references: [module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.allsecretsPolicies" references: [module.kms-policies-roles.aws_iam_policy.all_secret_policy] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.security_levels" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.class1_secret_kms_key_alias" references: [data.aws_kms_alias.root_key_alias_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local.current_account" references: [data.aws_caller_identity.current] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.class1_key_admin_role_arn" references: [module.kms-policies-roles.output.class1KmsKeyAdminRole_arn] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.read_only_users" references: [var.read_only_users] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.class1_key_alias_arns_str" references: [module.kms-policies-roles.var.class1_secret_kms_key_alias] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn" references: [module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.read_only_users" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.aws_kms_key.io_cmk1" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.sec_product_map" references: [module.kms-policies-roles.local.sec_product] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_io_root_alias_key_id" references: [module.kms-keys.data.aws_kms_key.io_cmk1_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_all_secrets_policies" references: [module.kms-policies-roles.output.secret_janitor_policy module.kms-policies-roles.output.allsecretsPolicies] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.own_credentials_mfa_managers_users" references: [var.own_credentials_mfa_managers_users] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" references: [module.iam-user-roles.var.read_only_users module.iam-user-roles.aws_iam_group.read_only_admins] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" references: [module.iam-user-roles.aws_iam_group.read_only_admins module.iam-user-roles.aws_iam_policy.assume_read_only] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.security_envs" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.target_account" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local_file.aws_config_suffix_file" references: [local.current_account var.target_account local.current_account var.target_account local.current_account module.kms-policies-roles.output.secProdTupMap] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" references: [module.iam-user-roles.var.class1_key_admin_users module.iam-user-roles.aws_iam_group.class1_kms_key_admins] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" references: [module.iam-user-roles.var.env_level_role_matrix module.iam-user-roles.aws_iam_group.secret_groups module.iam-user-roles.aws_iam_policy.assume_secret_role_policy] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" references: [module.iam-user-roles.aws_iam_group.admins module.iam-user-roles.var.admin_users] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.class1_key_admin_users" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" references: [module.kms-policies-roles.local.ssm_role_actions module.kms-policies-roles.var.target_region module.kms-policies-roles.var.target_account] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.sec_product" references: [module.kms-policies-roles.local.security_envs module.kms-policies-roles.local.security_levels module.kms-policies-roles.local.security_ssm_role] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_io_root_alias_arn" references: [module.kms-keys.data.aws_kms_key.io_cmk1_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "data.aws_kms_alias.root_key_alias_facts" references: [module.kms-keys.output.aws_kms_io_root_alias_name] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" references: [module.iam-user-roles.aws_iam_role.read_only] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.var.trusted_user_accounts" references: [local.current_account var.trusted_user_accounts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.trusted_user_accounts" references: [local.current_account var.trusted_user_accounts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_io_root_cmk1_state" references: [module.kms-keys.data.aws_kms_key.io_cmk1_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.allroles" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.target_region" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.class1_key_admin_users" references: [var.class1_key_admin_users] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "provider.aws" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_role.read_only" references: [module.iam-user-roles.local.account_arns] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" references: [module.kms-policies-roles.local.class1_key_arns_str module.kms-policies-roles.local.class1_key_alias_arns_str] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_cloudtrail_arn" references: [module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" references: [module.iam-user-roles.aws_iam_role.admin] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" references: [module.kms-policies-roles.local.account_arns] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" references: [module.kms-policies-roles.aws_iam_policy.secret_janitor_policy] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.account_arns" references: [module.kms-policies-roles.var.trusted_user_accounts] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.own_credentials_mfa_managers_users" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.assume_read_only" references: [module.iam-user-roles.aws_iam_role.read_only] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.admin_users" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.admin_users" references: [var.admin_users] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" references: [] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.aws_iam_role" references: [module.kms-policies-roles.aws_iam_role.secret_janitor_role] | |
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_rolee_names (orphan)" references: [] | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
local.current_account - *terraform.NodeLocal | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
provider.local - *terraform.NodeApplyableProvider | |
var.target_account - *terraform.NodeRootVariable | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
var.admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
var.target_account - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
var.target_region - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
local.current_account - *terraform.NodeLocal | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
provider.local - *terraform.NodeApplyableProvider | |
var.target_account - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
var.admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
var.target_account - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
var.target_region - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
local.current_account - *terraform.NodeLocal | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
provider.local - *terraform.NodeApplyableProvider | |
var.target_account - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
var.admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
var.target_account - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
var.target_region - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
provider.local (close) - *terraform.graphNodeCloseProvider | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes) | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.RootTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
local.current_account - *terraform.NodeLocal | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
provider.local - *terraform.NodeApplyableProvider | |
var.target_account - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
var.admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
var.target_account - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
var.target_region - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.local - *terraform.NodeApplyableProvider | |
provider.local (close) - *terraform.graphNodeCloseProvider | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
provider.local - *terraform.NodeApplyableProvider | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.local (close) - *terraform.graphNodeCloseProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
local.current_account - *terraform.NodeLocal | |
data.aws_caller_identity.current - *terraform.NodeValidatableResource | |
local.sec_product - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local.security_envs - *terraform.NodeLocal | |
local.security_levels - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
local.current_account - *terraform.NodeLocal | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
provider.local - *terraform.NodeApplyableProvider | |
var.target_account - *terraform.NodeRootVariable | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
local.sec_product - *terraform.NodeLocal | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.local.account_arns - *terraform.NodeLocal | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable | |
var.admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-keys.local.account_arns - *terraform.NodeLocal | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
provider.aws - *terraform.NodeApplyableProvider | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal | |
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal | |
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable | |
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable | |
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable | |
var.target_account - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable | |
var.target_region - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable | |
local.current_account - *terraform.NodeLocal | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable | |
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput | |
output.cloudtrail_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput | |
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput | |
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan | |
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan | |
output.root_key_admin_role - *terraform.NodeApplyableOutput | |
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput | |
output.root_key_alias_name - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput | |
output.root_key_arn - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput | |
output.root_key_key_id - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput | |
output.root_key_state - *terraform.NodeApplyableOutput | |
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput | |
provider.aws - *terraform.NodeApplyableProvider | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource | |
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource | |
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource | |
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource | |
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource | |
provider.local - *terraform.NodeApplyableProvider | |
provider.local (close) - *terraform.graphNodeCloseProvider | |
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource | |
root - terraform.graphNodeRoot | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider.aws (close) - *terraform.graphNodeCloseProvider | |
provider.local (close) - *terraform.graphNodeCloseProvider | |
var.admin_users - *terraform.NodeRootVariable | |
var.assume_env_level_role_access - *terraform.NodeRootVariable | |
var.class1_key_admin_users - *terraform.NodeRootVariable | |
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable | |
var.read_only_users - *terraform.NodeRootVariable | |
var.target_account - *terraform.NodeRootVariable | |
var.target_region - *terraform.NodeRootVariable | |
var.trusted_user_accounts - *terraform.NodeRootVariable | |
------ | |
2019/08/28 17:09:20 [DEBUG] Starting graph walk: walkValidate | |
2019/08/28 17:09:20 [TRACE] dag/walk: updating graph | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.class1_secret_kms_keys" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local.sec_product" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_rolee_arns (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_io_root_alias_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_policy_arns (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_state" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_all_secrets_policies" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "provider.local (close)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.security_ssm_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_admin_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.aws_iam_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.secProdTupMap" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_io_root_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.var.audit_key_prefix" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.aws_kms_alias.io_cmk1_alias" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.read_only_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_role.read_only" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.local.account_arns" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.assume_env_level_role_access" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.aws_kms_key.io_cmk1" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local.security_envs" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.security_levels" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_policies (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_role.secret_janitor_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.cloudtrail_key_key_id" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_cloudtrail_key_id" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.secret_groups" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.sec_product" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.target_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local_file.aws_config_suffix_file" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.sec_product_map" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_io_root_alias_key_id" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.class1_key_admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.local.account_arns" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.cloudtrail_key_state" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.assume_read_only" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.class1_secret_kms_key_alias" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.read_only_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.own_credentials_mfa_managers_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.class1_key_admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.secret_janitor_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.aws_iam_role_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.secret_roles" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "data.aws_caller_identity.current" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "data.aws_kms_alias.root_key_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.assume_env_level_role_access" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "provider.local" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.target_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.read_only_admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.target_region" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.cloudtrail_key_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.write_actions" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_cloudtrail_state" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.class1_key_alias_arns_str" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.own_credentials_mfa_managers_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.read_actions" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.cloudtrail_key_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.env_level_role_matrix" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local.security_levels" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.secret_janitor_policy_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_cloudtrail_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.account_arns" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_roles (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "provider.aws (close)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.class1_key_arns_str" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.target_region" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.class1_key_admin_role_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.allroles" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local.current_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_io_root_cmk1_state" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.security_envs" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.data.aws_kms_key.io_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.ssm_role_actions" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_cloudtrail_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_key_id" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "root" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_rolee_names (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.assume_admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_role.admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.allsecretsPolicies" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_all_secrets_policies" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_arn" waiting on "module.kms-keys.output.aws_kms_io_root_alias_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" waiting on "module.iam-user-roles.aws_iam_group.read_only_admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local_file.aws_config_suffix_file" waiting on "module.kms-policies-roles.output.secProdTupMap" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_alias_name" waiting on "module.kms-keys.output.aws_kms_io_root_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_io_root_cmk1_state" waiting on "module.kms-keys.data.aws_kms_key.io_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.read_only_users" waiting on "var.read_only_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" waiting on "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" waiting on "module.iam-user-roles.aws_iam_group.secret_groups" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_role.read_only" waiting on "module.iam-user-roles.local.account_arns" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.target_region" waiting on "var.target_region" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_policy_arns (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.trusted_user_accounts" waiting on "var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_cloudtrail_key_id" waiting on "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.allsecretsPolicies" waiting on "module.kms-policies-roles.aws_iam_policy.all_secret_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "root" waiting on "provider.local (close)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cloudtrail-audit.var.audit_key_prefix" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_rolee_arns (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.output.aws_iam_role_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.cloudtrail_key_alias_name" waiting on "module.kms-keys.output.aws_kms_cloudtrail_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.sec_product_map" waiting on "module.kms-policies-roles.local.sec_product" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local.sec_product" waiting on "local.security_envs" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.secret_janitor_policy" waiting on "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" waiting on "module.iam-user-roles.var.assume_env_level_role_access" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_io_root_alias_arn" waiting on "module.kms-keys.data.aws_kms_key.io_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "local.sec_product" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn" waiting on "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.cloudtrail_key_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.env_level_role_matrix" waiting on "module.kms-policies-roles.output.secProdTupMap" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" waiting on "module.iam-user-roles.aws_iam_group.admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" waiting on "module.kms-policies-roles.aws_iam_role.secret_janitor_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "data.aws_caller_identity.current" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" waiting on "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" waiting on "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.class1_key_alias_arns_str" waiting on "module.kms-policies-roles.var.class1_secret_kms_key_alias" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.cloudtrail_key_state" waiting on "module.kms-keys.output.aws_kms_cloudtrail_state" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" waiting on "module.kms-policies-roles.local.account_arns" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.data.aws_kms_key.io_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" waiting on "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.own_credentials_mfa_managers_users" waiting on "var.own_credentials_mfa_managers_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.secProdTupMap" waiting on "module.kms-policies-roles.local.sec_product_map" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.output.secret_janitor_policy_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_policies (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_cloudtrail_alias_name" waiting on "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" waiting on "module.kms-policies-roles.aws_iam_role.secret_janitor_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" waiting on "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" waiting on "module.iam-user-roles.var.admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" waiting on "module.iam-user-roles.var.class1_key_admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" waiting on "module.kms-policies-roles.var.target_region" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" waiting on "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_io_root_alias_key_id" waiting on "module.kms-keys.data.aws_kms_key.io_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_admin_role" waiting on "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.class1_secret_kms_key_alias" waiting on "data.aws_kms_alias.root_key_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.trusted_user_accounts" waiting on "local.current_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.aws_kms_alias.io_cmk1_alias" waiting on "module.kms-keys.aws_kms_key.io_cmk1" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local_file.aws_config_suffix_file" waiting on "provider.local" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.aws_kms_key.io_cmk1" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_io_root_alias_name" waiting on "module.kms-keys.aws_kms_alias.io_cmk1_alias" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.trusted_user_accounts" waiting on "var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.aws_iam_role" waiting on "module.kms-policies-roles.aws_iam_role.secret_janitor_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" waiting on "module.iam-user-roles.var.read_only_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.secret_groups" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local_file.aws_config_suffix_file" waiting on "local.current_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.aws_iam_role_arn" waiting on "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.target_account" waiting on "var.target_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_state" waiting on "module.kms-keys.output.aws_kms_io_root_cmk1_state" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.assume_env_level_role_access" waiting on "var.assume_env_level_role_access" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.secret_janitor_policy_arn" waiting on "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" waiting on "module.kms-policies-roles.var.target_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.local (close)" waiting on "local_file.aws_config_suffix_file" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.secret_roles" waiting on "module.kms-policies-roles.output.allroles" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" waiting on "module.iam-user-roles.var.own_credentials_mfa_managers_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_admin_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" waiting on "module.kms-policies-roles.local.ssm_role_actions" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_key_id" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local.current_account" waiting on "data.aws_caller_identity.current" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.cloudtrail_key_key_id" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_admin" waiting on "module.iam-user-roles.aws_iam_role.admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_key_id" waiting on "module.kms-keys.output.aws_kms_io_root_alias_key_id" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" waiting on "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.class1_secret_kms_keys" waiting on "data.aws_kms_alias.root_key_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.class1_key_admin_role_arn" waiting on "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.cloudtrail_key_arn" waiting on "module.kms-keys.output.aws_kms_cloudtrail_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.var.trusted_user_accounts" waiting on "local.current_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.output.aws_iam_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.var.trusted_user_accounts" waiting on "var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" waiting on "module.iam-user-roles.aws_iam_group.read_only_admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local_file.aws_config_suffix_file" waiting on "var.target_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" waiting on "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_role.secret_janitor_role" waiting on "module.kms-policies-roles.local.account_arns" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.sec_product" waiting on "module.kms-policies-roles.local.security_levels" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.admins" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "data.aws_kms_alias.root_key_alias_facts" waiting on "module.kms-keys.output.aws_kms_io_root_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.sec_product" waiting on "module.kms-policies-roles.local.security_envs" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" waiting on "module.kms-policies-roles.local.class1_key_arns_str" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" waiting on "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" waiting on "module.kms-policies-roles.var.target_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.ssm_role_actions" waiting on "module.kms-policies-roles.var.read_actions" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.cloudtrail_key_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_rolee_names (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" waiting on "module.iam-user-roles.var.class1_key_admin_role_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.aws_iam_policy.all_secret_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" waiting on "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_alias_name" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" waiting on "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "local_file.aws_config_suffix_file" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" waiting on "module.iam-user-roles.var.secret_roles" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_roles (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" waiting on "module.iam-user-roles.var.env_level_role_matrix" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.kms_all_secrets_policies" waiting on "module.kms-policies-roles.output.allsecretsPolicies" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.cloudtrail_key_key_id" waiting on "module.kms-keys.output.aws_kms_cloudtrail_key_id" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.admin_users" waiting on "var.admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" waiting on "module.iam-user-roles.aws_iam_policy.assume_admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.account_arns" waiting on "module.kms-policies-roles.var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.ssm_role_actions" waiting on "module.kms-policies-roles.var.write_actions" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" waiting on "module.kms-keys.local.account_arns" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" waiting on "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.data.aws_kms_key.io_cmk1_facts" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.local.account_arns" waiting on "module.kms-keys.var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.sec_product" waiting on "module.kms-policies-roles.local.security_ssm_role" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.local.account_arns" waiting on "module.iam-user-roles.var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local.sec_product" waiting on "local.security_levels" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.read_only_admins" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" waiting on "module.kms-policies-roles.local.class1_key_alias_arns_str" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" waiting on "module.iam-user-roles.aws_iam_group.secret_groups" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_cloudtrail_arn" waiting on "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" waiting on "provider.aws" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_cloudtrail_state" waiting on "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.cloudtrail_key_state" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.secret_groups" waiting on "module.iam-user-roles.var.env_level_role_matrix" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.kms_all_secrets_policies" waiting on "module.kms-policies-roles.output.secret_janitor_policy" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.trusted_user_accounts" waiting on "local.current_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_role.admin" waiting on "module.iam-user-roles.local.account_arns" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_read_only" waiting on "module.iam-user-roles.aws_iam_role.read_only" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.class1_key_arns_str" waiting on "module.kms-policies-roles.var.class1_secret_kms_keys" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" waiting on "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" waiting on "module.iam-user-roles.aws_iam_group.admins" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" waiting on "module.iam-user-roles.aws_iam_role.admin" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" waiting on "module.iam-user-roles.aws_iam_role.read_only" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_state" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" waiting on "module.iam-user-roles.aws_iam_policy.assume_read_only" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" waiting on "module.kms-policies-roles.var.target_region" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.class1_key_admin_users" waiting on "var.class1_key_admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" | |
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_alias_name", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_io_root_alias_key_id", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.data.aws_kms_key.io_cmk1_facts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.read_only_users", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.kms_all_secrets_policies", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.own_credentials_mfa_managers_users", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.ssm_role_actions", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.allsecretsPolicies", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_io_root_alias_arn", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.secret_janitor_policy_arn", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_arn", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.secret_roles", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.assume_admin", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.secret_janitor_policy", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.class1_key_alias_arns_str", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_io_root_alias_name", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "local.current_account", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "data.aws_kms_alias.root_key_alias_facts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_role.read_only", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.read_only_admins", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_cloudtrail_arn", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.secret_groups", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.assume_env_level_role_access", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.cloudtrail_key_arn", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.cloudtrail_key_alias_name", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.cloudtrail_key_state", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_cloudtrail_state", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.target_region", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.trusted_user_accounts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_cloudtrail_key_id", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.sec_product_map", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.secret_group_membership", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_io_root_cmk1_state", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.aws_iam_role_arn", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.target_account", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_admin_role", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.aws_kms_key.io_cmk1", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_state", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "provider.local (close)", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_cloudtrail_alias_name", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_key_id", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.var.trusted_user_accounts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.sec_product", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.admins", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "local_file.aws_config_suffix_file", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_role.admin", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy.all_secret_policy", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.trusted_user_accounts", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.cloudtrail_key_key_id", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.local.account_arns", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.assume_read_only", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "root", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "data.aws_caller_identity.current", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.class1_key_arns_str", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.secProdTupMap", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.class1_kms_key_admins", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.local.account_arns", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.aws_kms_alias.io_cmk1_alias", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.aws_iam_role", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.admin_users", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "local.sec_product", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.class1_secret_kms_key_alias", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.class1_key_admin_role_arn", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_role.secret_janitor_role", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.env_level_role_matrix", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.admin_group_membership", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.account_arns", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.class1_key_admin_users", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.class1_secret_kms_keys", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa", sending new deps | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.target_region" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.var.read_actions" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.read_actions": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "local.security_levels" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.read_actions": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "local.security_levels": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.output.allroles" | |
2019/08/28 17:09:20 [TRACE] vertex "local.security_levels": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.allroles": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.security_levels" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_levels": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "provider.aws" | |
2019/08/28 17:09:20 [TRACE] vertex "provider.aws": starting visit (*terraform.NodeApplyableProvider) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.allroles": evaluating | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.var.write_actions" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.read_only_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "local.security_envs" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_policies (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.admin_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_policy_arns (orphan)" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.own_credentials_mfa_managers_users" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "provider.local" | |
2019/08/28 17:09:20 [TRACE] vertex "var.own_credentials_mfa_managers_users": starting visit (*terraform.NodeRootVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "provider.local": starting visit (*terraform.NodeApplyableProvider) | |
2019/08/28 17:09:20 [TRACE] vertex "var.own_credentials_mfa_managers_users": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "var.target_region": starting visit (*terraform.NodeRootVariable) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.own_credentials_mfa_managers_users" | |
2019/08/28 17:09:20 [TRACE] vertex "provider.local": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.own_credentials_mfa_managers_users": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: provider.local | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.own_credentials_mfa_managers_users": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.own_credentials_mfa_managers_users | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2019-08-28T17:09:20.753+1000 [INFO] plugin: configuring client automatic mTLS | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: local.security_levels | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: local.security_levels | |
2019/08/28 17:09:20 [TRACE] vertex "local.security_levels": visit complete | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.own_credentials_mfa_managers_users | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.own_credentials_mfa_managers_users": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "var.target_region": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.var.target_region" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_region": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_region": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.var.target_region | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_roles (orphan)" | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_roles (orphan)": starting visit (*terraform.NodeOutputOrphan) | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.var.target_region | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_region": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_roles (orphan)": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_roles (orphan) | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_roles (orphan) | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_roles (orphan)": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.var.read_actions | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.var.read_actions | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.read_actions": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.output.allroles | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalWriteOutput | |
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving value for module.kms-policies-roles.output.allroles in state | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_rolee_names (orphan)" | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_names (orphan)": starting visit (*terraform.NodeOutputOrphan) | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_names (orphan)": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_rolee_names (orphan) | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_rolee_names (orphan) | |
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving Create change for module.kms-policies-roles.output.allroles in changeset | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.output.allroles | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.allroles": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_names (orphan)": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.secret_roles" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.secret_roles": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.secret_roles": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.secret_roles | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.trusted_user_accounts" | |
2019/08/28 17:09:20 [TRACE] vertex "var.trusted_user_accounts": starting visit (*terraform.NodeRootVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "var.trusted_user_accounts": visit complete | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.class1_key_admin_users" | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.secret_roles | |
2019/08/28 17:09:20 [TRACE] vertex "var.class1_key_admin_users": starting visit (*terraform.NodeRootVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.secret_roles": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "var.class1_key_admin_users": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.cloudtrail-audit.var.audit_key_prefix" | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.var.audit_key_prefix": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.var.audit_key_prefix": evaluating | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.class1_key_admin_users" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.class1_key_admin_users": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.class1_key_admin_users": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.class1_key_admin_users | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.class1_key_admin_users | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.class1_key_admin_users": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.cloudtrail-audit.var.audit_key_prefix | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.cloudtrail-audit.var.audit_key_prefix | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.var.audit_key_prefix": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_levels": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.security_levels | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.security_levels | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_levels": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.target_account" | |
2019/08/28 17:09:20 [TRACE] vertex "var.target_account": starting visit (*terraform.NodeRootVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "var.target_account": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.var.target_account" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.assume_env_level_role_access" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_account": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "var.assume_env_level_role_access": starting visit (*terraform.NodeRootVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_account": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "var.assume_env_level_role_access": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.var.target_account | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.assume_env_level_role_access" | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.assume_env_level_role_access": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.write_actions": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.assume_env_level_role_access": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.assume_env_level_role_access | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.assume_env_level_role_access | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.assume_env_level_role_access": visit complete | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.var.target_account | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_account": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.write_actions": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.var.write_actions | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.var.write_actions | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.write_actions": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.ssm_role_actions" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.ssm_role_actions": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.ssm_role_actions": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.ssm_role_actions | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] vertex "var.read_only_users": starting visit (*terraform.NodeRootVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "var.read_only_users": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.ssm_role_actions | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.ssm_role_actions": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.read_only_users" | |
2019/08/28 17:09:20 [TRACE] vertex "local.security_envs": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.read_only_users": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "local.security_envs": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: local.security_envs | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: local.security_envs | |
2019/08/28 17:09:20 [TRACE] vertex "local.security_envs": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "local.sec_product" | |
2019/08/28 17:09:20 [TRACE] vertex "local.sec_product": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] vertex "local.sec_product": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: local.sec_product | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.read_only_users": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: local.sec_product | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.read_only_users | |
2019/08/28 17:09:20 [TRACE] vertex "local.sec_product": visit complete | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.read_only_users | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.read_only_users": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policy_arns (orphan)": starting visit (*terraform.NodeOutputOrphan) | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policy_arns (orphan)": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_policy_arns (orphan) | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_policy_arns (orphan) | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policy_arns (orphan)": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_rolee_arns (orphan)" | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_arns (orphan)": starting visit (*terraform.NodeOutputOrphan) | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_arns (orphan)": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_rolee_arns (orphan) | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_rolee_arns (orphan) | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_arns (orphan)": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.security_envs" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_envs": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_envs": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.security_envs | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.security_envs | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_envs": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.security_ssm_role" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_ssm_role": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_ssm_role": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.security_ssm_role | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.security_ssm_role | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_ssm_role": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.sec_product" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "provider.aws": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.sec_product | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: provider.aws | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalInitProvider | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policies (orphan)": starting visit (*terraform.NodeOutputOrphan) | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policies (orphan)": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_policies (orphan) | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_policies (orphan) | |
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policies (orphan)": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "var.admin_users": starting visit (*terraform.NodeRootVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "var.admin_users": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.admin_users" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.admin_users": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.sec_product | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.admin_users": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.admin_users | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.sec_product_map" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product_map": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product_map": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.sec_product_map | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.admin_users | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.admin_users": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.sec_product_map | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product_map": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.output.secProdTupMap" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secProdTupMap": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secProdTupMap": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.output.secProdTupMap | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalWriteOutput | |
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving value for module.kms-policies-roles.output.secProdTupMap in state | |
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving Create change for module.kms-policies-roles.output.secProdTupMap in changeset | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.output.secProdTupMap | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secProdTupMap": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.env_level_role_matrix" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.env_level_role_matrix": starting visit (*terraform.NodeApplyableModuleVariable) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.env_level_role_matrix": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.env_level_role_matrix | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.env_level_role_matrix | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.env_level_role_matrix": visit complete | |
2019-08-28T17:09:20.774+1000 [DEBUG] plugin: starting plugin: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 args=[/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4] | |
2019-08-28T17:09:20.774+1000 [DEBUG] plugin: plugin started: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 pid=14991 | |
2019-08-28T17:09:20.774+1000 [DEBUG] plugin: waiting for RPC address: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 | |
2019-08-28T17:09:20.779+1000 [INFO] plugin.terraform-provider-local_v1.3.0_x4: configuring server automatic mTLS: timestamp=2019-08-28T17:09:20.779+1000 | |
2019-08-28T17:09:20.800+1000 [DEBUG] plugin.terraform-provider-local_v1.3.0_x4: plugin address: address=/tmp/plugin991014093 network=unix timestamp=2019-08-28T17:09:20.800+1000 | |
2019-08-28T17:09:20.800+1000 [DEBUG] plugin: using plugin: version=5 | |
2019/08/28 17:09:20 [TRACE] BuiltinEvalContext: Initialized "local" provider for provider.local | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalValidateProvider | |
2019/08/28 17:09:20 [TRACE] buildProviderConfig for provider.local: no configuration at all | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: GetSchema | |
2019-08-28T17:09:20.800+1000 [INFO] plugin: configuring client automatic mTLS | |
2019-08-28T17:09:20.824+1000 [DEBUG] plugin: starting plugin: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 args=[/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4] | |
2019-08-28T17:09:20.824+1000 [DEBUG] plugin: plugin started: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 pid=15010 | |
2019-08-28T17:09:20.824+1000 [DEBUG] plugin: waiting for RPC address: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 | |
2019-08-28T17:09:20.835+1000 [INFO] plugin.terraform-provider-aws_v2.24.0_x4: configuring server automatic mTLS: timestamp=2019-08-28T17:09:20.835+1000 | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: PrepareProviderConfig | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: provider.local | |
2019/08/28 17:09:20 [TRACE] vertex "provider.local": visit complete | |
2019-08-28T17:09:20.856+1000 [DEBUG] plugin: using plugin: version=5 | |
2019-08-28T17:09:20.856+1000 [DEBUG] plugin.terraform-provider-aws_v2.24.0_x4: plugin address: address=/tmp/plugin640061052 network=unix timestamp=2019-08-28T17:09:20.856+1000 | |
2019/08/28 17:09:20 [TRACE] BuiltinEvalContext: Initialized "aws" provider for provider.aws | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalValidateProvider | |
2019/08/28 17:09:20 [TRACE] buildProviderConfig for provider.aws: using explicit config only | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: GetSchema | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: PrepareProviderConfig | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: provider.aws | |
2019/08/28 17:09:20 [TRACE] vertex "provider.aws": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.data.aws_kms_key.io_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.io_cmk1_facts": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.io_cmk1_facts": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.data.aws_kms_key.io_cmk1_facts | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.read_only_admins" | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.secret_groups" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.secret_groups": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.aws_kms_key.io_cmk1" | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail": evaluating | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_key.io_cmk1": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.aws_iam_policy.all_secret_policy" | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.class1_kms_key_admins": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "data.aws_caller_identity.current" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.class1_kms_key_admins": evaluating | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" | |
2019/08/28 17:09:20 [TRACE] vertex "data.aws_caller_identity.current": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.class1_kms_key_admins | |
2019/08/28 17:09:20 [TRACE] vertex "data.aws_caller_identity.current": evaluating | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: data.aws_caller_identity.current | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.admins" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.admins": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.admins": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.admins | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail": evaluating | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_key.io_cmk1": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.aws_kms_key.io_cmk1 | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.all_secret_policy": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.all_secret_policy": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.read_only_admins": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy": evaluating | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.aws_iam_policy.secret_janitor_policy | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.read_only_admins": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.read_only_admins | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: data.aws_caller_identity.current | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_policy.assume_secret_role_policy | |
2019/08/28 17:09:20 [TRACE] vertex "data.aws_caller_identity.current": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.aws_iam_policy.all_secret_policy | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.secret_groups": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.secret_groups | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "local.current_account" | |
2019/08/28 17:09:20 [TRACE] vertex "local.current_account": starting visit (*terraform.NodeLocal) | |
2019/08/28 17:09:20 [TRACE] vertex "local.current_account": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: local.current_account | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_group.class1_kms_key_admins | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.class1_kms_key_admins": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.data.aws_kms_key.io_cmk1_facts | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.io_cmk1_facts": visit complete | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts": visit complete | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_io_root_alias_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_io_root_alias_key_id" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_arn": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_key_id": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_arn": evaluating | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_io_root_cmk1_state" | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_io_root_alias_arn | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_cmk1_state": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_key_id": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_cmk1_state": evaluating | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_io_root_cmk1_state | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_io_root_alias_key_id | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail": visit complete | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.aws_iam_policy.secret_janitor_policy | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.output.secret_janitor_policy" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secret_janitor_policy": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.aws_kms_key.io_cmk1 | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secret_janitor_policy": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_key.io_cmk1": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.output.secret_janitor_policy | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_group.admins | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.aws_kms_alias.io_cmk1_alias" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_alias.io_cmk1_alias": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_alias.io_cmk1_alias": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.aws_kms_alias.io_cmk1_alias | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_policy.assume_secret_role_policy | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalWriteOutput | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.admins": visit complete | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalLocal | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts": visit complete | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_cloudtrail_arn" | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.admin_group_membership": starting visit (*terraform.NodeValidatableResource) | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_cloudtrail_state" | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.admin_group_membership": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_state": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group_membership.admin_group_membership | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_cloudtrail_key_id" | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_state": evaluating | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_key_id": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_key_id": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: local.current_account | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_cloudtrail_key_id | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_arn": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalWriteOutput | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts": visit complete | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Removing module.kms-keys.output.aws_kms_io_root_alias_key_id from state (it is now null) | |
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving Create change for module.kms-keys.output.aws_kms_io_root_alias_key_id in changeset | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.output.aws_kms_io_root_alias_key_id | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_key_id": visit complete | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalOpFilter | |
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.root_key_key_id" | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalWriteOutput | |
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] vertex "output.root_key_key_id": starting visit (*terraform.NodeApplyableOutput) | |
2019/08/28 17:09:20 [TRACE] vertex "output.root_key_key_id": evaluating | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.root_key_key_id | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Removing module.kms-policies-roles.output.secret_janitor_policy from state (it is now null) | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_cloudtrail_state | |
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving Create change for module.kms-policies-roles.output.secret_janitor_policy in changeset | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.output.secret_janitor_policy | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secret_janitor_policy": visit complete | |
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider | |
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource | |
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig | |
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.all_secret_policy": visit complete | |
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_group.read_only_admins | |
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.read_only_admins": visit complete | |
panic: not a string | |
goroutine 402 [running]: | |
github.com/zclconf/go-cty/cty.Value.AsString(...) | |
/opt/teamcity-agent/work/9e329aa031982669/pkg/mod/github.com/zclconf/[email protected]/cty/value_ops.go:1026 | |
github.com/zclconf/go-cty/cty.Value.AsValueMap(0x2228cc0, 0xc0006f5c60, 0x19cd420, 0xc0006f5c80, 0x2) | |
/opt/teamcity-agent/work/9e329aa031982669/pkg/mod/github.com/zclconf/[email protected]/cty/value_ops.go:1095 +0x38a | |
github.com/hashicorp/terraform/terraform.evaluateResourceForEachExpressionKnown(0x7f3e4ffd3638, 0xc000528fa0, 0x225a540, 0xc0005cc000, 0x727464756f6c632e, 0x696475615f6c6961, 0x665f316b6d635f74, 0x40b849, 0xc000b9d6b8) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval_for_each.go:84 +0x5bd | |
github.com/hashicorp/terraform/terraform.(*EvalValidateResource).validateForEach(0xc0014dc190, 0x225a540, 0xc0005cc000, 0x7f3e4ffd3638, 0xc000528fa0, 0x0, 0x6f6d20200a747570, 0x736d6b2e656c7564) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval_validate.go:572 +0x59 | |
github.com/hashicorp/terraform/terraform.(*EvalValidateResource).Eval(0xc0014dc190, 0x225a540, 0xc0005cc000, 0x2, 0x2, 0x0, 0x0) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval_validate.go:394 +0x1b57 | |
github.com/hashicorp/terraform/terraform.EvalRaw(0x21e7340, 0xc0014dc190, 0x225a540, 0xc0005cc000, 0x0, 0x0, 0x0, 0x0) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval.go:57 +0x131 | |
github.com/hashicorp/terraform/terraform.(*EvalSequence).Eval(0xc00013c080, 0x225a540, 0xc0005cc000, 0x2, 0x2, 0xed4375, 0x21e7340) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval_sequence.go:20 +0xfd | |
github.com/hashicorp/terraform/terraform.EvalRaw(0x21e72a0, 0xc00013c080, 0x225a540, 0xc0005cc000, 0x1a840c0, 0x3200165, 0x19f0bc0, 0xc000fe22e0) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval.go:57 +0x131 | |
github.com/hashicorp/terraform/terraform.Eval(0x21e72a0, 0xc00013c080, 0x225a540, 0xc0005cc000, 0xc00013c080, 0x21e72a0, 0xc00013c080, 0x0) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval.go:35 +0x4d | |
github.com/hashicorp/terraform/terraform.(*Graph).walk.func1(0x1ce36e0, 0xc000424480, 0x0, 0x0, 0x0) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/graph.go:90 +0xf40 | |
github.com/hashicorp/terraform/dag.(*Walker).walkVertex(0xc0004f2080, 0x1ce36e0, 0xc000424480, 0xc000a572c0) | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/dag/walk.go:392 +0x353 | |
created by github.com/hashicorp/terraform/dag.(*Walker).Update | |
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/dag/walk.go:314 +0xa9b |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment