Created
April 15, 2021 08:24
-
-
Save sblask/6e24b1b5489f39fc96b181f98282804b to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
~/Clones/sandpit $ TF_LOG=TRACE terraform_0_15_0 plan -out plan | |
2021-04-15T20:18:05.888+1200 [DEBUG] Adding temp file log sink: /var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/terraform-log369535931 | |
2021-04-15T20:18:05.888+1200 [INFO] Terraform version: 0.15.0 | |
2021-04-15T20:18:05.888+1200 [INFO] Go runtime version: go1.16.2 | |
2021-04-15T20:18:05.888+1200 [INFO] CLI args: []string{"/Users/sebastian/.bin/terraform_0_15_0", "plan", "-out", "plan"} | |
2021-04-15T20:18:05.889+1200 [TRACE] Stdout is a terminal of width 137 | |
2021-04-15T20:18:05.889+1200 [TRACE] Stderr is a terminal of width 137 | |
2021-04-15T20:18:05.889+1200 [TRACE] Stdin is a terminal | |
2021-04-15T20:18:05.889+1200 [DEBUG] Attempting to open CLI config file: /Users/sebastian/.terraformrc | |
2021-04-15T20:18:05.889+1200 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2021-04-15T20:18:05.889+1200 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2021-04-15T20:18:05.889+1200 [DEBUG] ignoring non-existing provider search directory /Users/sebastian/.terraform.d/plugins | |
2021-04-15T20:18:05.889+1200 [DEBUG] ignoring non-existing provider search directory /Users/sebastian/Library/Application Support/io.terraform/plugins | |
2021-04-15T20:18:05.889+1200 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins | |
2021-04-15T20:18:05.889+1200 [INFO] CLI command args: []string{"plan", "-out", "plan"} | |
2021-04-15T20:18:05.890+1200 [TRACE] Meta.Backend: no config given or present on disk, so returning nil config | |
2021-04-15T20:18:05.890+1200 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory | |
2021-04-15T20:18:05.890+1200 [DEBUG] New state was assigned lineage "71961561-cd2b-b0be-42e4-c2b80aed491a" | |
2021-04-15T20:18:05.890+1200 [TRACE] Meta.Backend: using default local state only (no backend configuration, and no existing initialized backend) | |
2021-04-15T20:18:05.890+1200 [TRACE] Meta.Backend: instantiated backend of type <nil> | |
2021-04-15T20:18:05.891+1200 [TRACE] providercache.fillMetaCache: scanning directory .terraform/providers | |
2021-04-15T20:18:05.891+1200 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/aws v3.36.0 for darwin_amd64 at .terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64 | |
2021-04-15T20:18:05.891+1200 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64 as a candidate package for registry.terraform.io/hashicorp/aws 3.36.0 | |
2021-04-15T20:18:06.356+1200 [DEBUG] checking for provisioner in "." | |
2021-04-15T20:18:06.357+1200 [DEBUG] checking for provisioner in "/Users/sebastian/.bin" | |
2021-04-15T20:18:06.357+1200 [INFO] Failed to read plugin lock file .terraform/plugins/darwin_amd64/lock.json: open .terraform/plugins/darwin_amd64/lock.json: no such file or directory | |
2021-04-15T20:18:06.357+1200 [TRACE] Meta.Backend: backend <nil> does not support operations, so wrapping it in a local backend | |
2021-04-15T20:18:06.357+1200 [INFO] backend/local: starting Plan operation | |
2021-04-15T20:18:06.358+1200 [TRACE] backend/local: requesting state manager for workspace "default" | |
2021-04-15T20:18:06.358+1200 [TRACE] backend/local: state manager for workspace "default" will: | |
- read initial snapshot from terraform.tfstate | |
- write new snapshots to terraform.tfstate | |
- create any backup at terraform.tfstate.backup | |
2021-04-15T20:18:06.358+1200 [TRACE] backend/local: requesting state lock for workspace "default" | |
2021-04-15T20:18:06.358+1200 [TRACE] statemgr.Filesystem: preparing to manage state snapshots at terraform.tfstate | |
2021-04-15T20:18:06.358+1200 [TRACE] statemgr.Filesystem: existing snapshot has lineage "6203beae-7a1c-f608-695f-d7ec1e7239a8" serial 18 | |
2021-04-15T20:18:06.358+1200 [TRACE] statemgr.Filesystem: locking terraform.tfstate using fcntl flock | |
2021-04-15T20:18:06.358+1200 [TRACE] statemgr.Filesystem: writing lock metadata to .terraform.tfstate.lock.info | |
2021-04-15T20:18:06.359+1200 [TRACE] backend/local: reading remote state for workspace "default" | |
2021-04-15T20:18:06.359+1200 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate | |
2021-04-15T20:18:06.359+1200 [TRACE] statemgr.Filesystem: read snapshot with lineage "6203beae-7a1c-f608-695f-d7ec1e7239a8" serial 18 | |
2021-04-15T20:18:06.359+1200 [TRACE] backend/local: retrieving local state snapshot for workspace "default" | |
2021-04-15T20:18:06.359+1200 [TRACE] backend/local: building context for current working directory | |
2021-04-15T20:18:06.360+1200 [TRACE] terraform.NewContext: starting | |
2021-04-15T20:18:06.360+1200 [TRACE] terraform.NewContext: loading provider schemas | |
2021-04-15T20:18:06.360+1200 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/aws" | |
2021-04-15T20:18:06.360+1200 [DEBUG] created provider logger: level=trace | |
2021-04-15T20:18:06.360+1200 [INFO] provider: configuring client automatic mTLS | |
2021-04-15T20:18:06.390+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5] | |
2021-04-15T20:18:06.399+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55774 | |
2021-04-15T20:18:06.399+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 | |
2021-04-15T20:18:06.441+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T20:18:06.441+1200 | |
2021-04-15T20:18:06.476+1200 [DEBUG] provider: using plugin: version=5 | |
2021-04-15T20:18:06.476+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin796884205 network=unix timestamp=2021-04-15T20:18:06.476+1200 | |
2021-04-15T20:18:06.518+1200 [TRACE] GRPCProvider: GetProviderSchema | |
2021-04-15T20:18:06.518+1200 [TRACE] provider.stdio: waiting for stdio data | |
2021-04-15T20:18:06.588+1200 [TRACE] GRPCProvider: Close | |
2021-04-15T20:18:06.589+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-04-15T20:18:06.593+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55774 | |
2021-04-15T20:18:06.593+1200 [DEBUG] provider: plugin exited | |
2021-04-15T20:18:06.593+1200 [TRACE] terraform.NewContext: complete | |
2021-04-15T20:18:06.593+1200 [TRACE] backend/local: finished building terraform.Context | |
2021-04-15T20:18:06.593+1200 [TRACE] backend/local: requesting interactive input, if necessary | |
2021-04-15T20:18:06.593+1200 [TRACE] Context.Input: Prompting for provider arguments | |
2021-04-15T20:18:06.594+1200 [TRACE] Context.Input: Provider provider.aws declared at main.tf:3,1-15 | |
2021-04-15T20:18:06.594+1200 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{} | |
2021-04-15T20:18:06.594+1200 [TRACE] backend/local: running validation operation | |
2021-04-15T20:18:06.594+1200 [INFO] terraform: building graph: GraphTypeValidate | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] ConfigTransformer: Starting for path: | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
------ | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
------ | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] StateTransformer: state is empty, so nothing to do | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.test" (*terraform.NodeValidatableResource) config from main.tf:60,1-49 | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.test | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.instance" (*terraform.NodeValidatableResource) config from main.tf:29,1-35 | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.instance | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.assume_test" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:18, Column:1, Byte:187}, End:hcl.Pos{Line:18, Column:45, Byte:231}} | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.assume_test | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.test" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:36, Column:1, Byte:584}, End:hcl.Pos{Line:36, Column:38, Byte:621}} | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.test | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.test" (*terraform.NodeValidatableResource) config from main.tf:46,1-33 | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.test | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.test" (*terraform.NodeValidatableResource) config from main.tf:53,1-31 | |
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.test | |
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from main.tf:3,1-15 | |
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021-04-15T20:18:06.594+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.assume_test | |
2021-04-15T20:18:06.594+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.assume_test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.594+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.test | |
2021-04-15T20:18:06.594+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.594+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.test | |
2021-04-15T20:18:06.594+1200 [DEBUG] ProviderTransformer: "aws_iam_policy.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.594+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.test | |
2021-04-15T20:18:06.594+1200 [DEBUG] ProviderTransformer: "aws_iam_role.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.596+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.test | |
2021-04-15T20:18:06.596+1200 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.596+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.instance | |
2021-04-15T20:18:06.596+1200 [DEBUG] ProviderTransformer: "aws_iam_role.instance" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.596+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.596+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021-04-15T20:18:06.596+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021-04-15T20:18:06.596+1200 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.596+1200 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021-04-15T20:18:06.596+1200 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021-04-15T20:18:06.596+1200 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.test | |
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.test | |
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.test | |
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.instance | |
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.assume_test | |
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.test | |
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes) | |
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test" references: [local.users (expand) data.aws_iam_policy_document.test] | |
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test" references: [local.users (expand) data.aws_iam_policy_document.assume_test] | |
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test" references: [local.users (expand) aws_iam_policy.test aws_iam_role.test] | |
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance" references: [local.users (expand) data.aws_iam_policy_document.assume_test] | |
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_test" references: [] | |
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test" references: [local.users (expand) aws_iam_role.instance] | |
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "local.users (expand)" references: [] | |
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.attachDataResourceDependsOnTransformer | |
2021-04-15T20:18:06.597+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.assume_test depends on [] | |
2021-04-15T20:18:06.597+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.test depends on [aws_iam_role.instance data.aws_iam_policy_document.assume_test] | |
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.attachDataResourceDependsOnTransformer (no changes) | |
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021-04-15T20:18:06.598+1200 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.598+1200 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021-04-15T20:18:06.598+1200 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.598+1200 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021-04-15T20:18:06.598+1200 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021-04-15T20:18:06.598+1200 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021-04-15T20:18:06.598+1200 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
aws_iam_policy.test - *terraform.NodeValidatableResource | |
aws_iam_role.test - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource | |
aws_iam_role.instance - *terraform.NodeValidatableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021-04-15T20:18:06.598+1200 [DEBUG] Starting graph walk: walkValidate | |
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": expanding dynamic subgraph | |
2021-04-15T20:18:06.598+1200 [TRACE] Expanding local: adding local.users as *terraform.NodeLocal | |
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": entering dynamic subgraph | |
2021-04-15T20:18:06.598+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users": starting visit (*terraform.NodeLocal) | |
2021-04-15T20:18:06.598+1200 [DEBUG] created provider logger: level=trace | |
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users": visit complete | |
2021-04-15T20:18:06.598+1200 [INFO] provider: configuring client automatic mTLS | |
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": dynamic subgraph completed successfully | |
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": visit complete | |
2021-04-15T20:18:06.629+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5] | |
2021-04-15T20:18:06.642+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55775 | |
2021-04-15T20:18:06.642+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 | |
2021-04-15T20:18:06.687+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T20:18:06.687+1200 | |
2021-04-15T20:18:06.723+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin643751042 network=unix timestamp=2021-04-15T20:18:06.723+1200 | |
2021-04-15T20:18:06.723+1200 [DEBUG] provider: using plugin: version=5 | |
2021-04-15T20:18:06.765+1200 [TRACE] provider.stdio: waiting for stdio data | |
2021-04-15T20:18:06.765+1200 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.766+1200 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021-04-15T20:18:06.766+1200 [TRACE] GRPCProvider: GetProviderSchema | |
2021-04-15T20:18:06.830+1200 [TRACE] GRPCProvider: ValidateProviderConfig | |
2021-04-15T20:18:06.894+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021-04-15T20:18:06.895+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T20:18:06.895+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig | |
2021-04-15T20:18:06.895+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:06 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:06.895+1200 | |
2021-04-15T20:18:06.895+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:06 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:06.895+1200 | |
2021-04-15T20:18:06.895+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:06 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:06.895+1200 | |
2021-04-15T20:18:06.895+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": visit complete | |
2021-04-15T20:18:06.895+1200 [TRACE] vertex "aws_iam_role.test": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T20:18:06.895+1200 [TRACE] vertex "aws_iam_role.instance": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T20:18:06.896+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:06.896+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:06.896+1200 [TRACE] vertex "aws_iam_role.test": visit complete | |
2021-04-15T20:18:06.896+1200 [TRACE] vertex "aws_iam_role.instance": visit complete | |
2021-04-15T20:18:06.896+1200 [TRACE] vertex "data.aws_iam_policy_document.test": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T20:18:06.896+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig | |
2021-04-15T20:18:06.897+1200 [TRACE] vertex "data.aws_iam_policy_document.test": visit complete | |
2021-04-15T20:18:06.897+1200 [TRACE] vertex "aws_iam_policy.test": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T20:18:06.897+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:06.897+1200 [TRACE] vertex "aws_iam_policy.test": visit complete | |
2021-04-15T20:18:06.897+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T20:18:06.897+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:06.898+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": visit complete | |
2021-04-15T20:18:06.898+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021-04-15T20:18:06.898+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-04-15T20:18:06.898+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021-04-15T20:18:06.898+1200 [TRACE] GRPCProvider: Close | |
2021-04-15T20:18:06.898+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-04-15T20:18:06.901+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55775 | |
2021-04-15T20:18:06.901+1200 [DEBUG] provider: plugin exited | |
2021-04-15T20:18:06.901+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021-04-15T20:18:06.901+1200 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021-04-15T20:18:06.901+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T20:18:06.901+1200 [INFO] backend/local: plan calling Plan | |
2021-04-15T20:18:06.901+1200 [INFO] terraform: building graph: GraphTypePlan | |
2021-04-15T20:18:06.901+1200 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021-04-15T20:18:06.901+1200 [TRACE] ConfigTransformer: Starting for path: | |
2021-04-15T20:18:06.901+1200 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
------ | |
2021-04-15T20:18:06.901+1200 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021-04-15T20:18:06.901+1200 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021-04-15T20:18:06.901+1200 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021-04-15T20:18:06.901+1200 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021-04-15T20:18:06.901+1200 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021-04-15T20:18:06.901+1200 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
------ | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] StateTransformer: creating nodes for deposed instance objects only | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.instance (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:29,1-35 | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.instance (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.test (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:46,1-33 | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.assume_test (expand)" (*terraform.nodeExpandPlannableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:18, Column:1, Byte:187}, End:hcl.Pos{Line:18, Column:45, Byte:231}} | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.assume_test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.test (expand)" (*terraform.nodeExpandPlannableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:36, Column:1, Byte:584}, End:hcl.Pos{Line:36, Column:38, Byte:621}} | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.test (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:53,1-31 | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.test (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:60,1-49 | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from main.tf:3,1-15 | |
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.test (expand) | |
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "aws_iam_role.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.test (expand) | |
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.instance (expand) | |
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "aws_iam_role.instance (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.test (expand) | |
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "aws_iam_policy.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.assume_test (expand) | |
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.assume_test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.test (expand) | |
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.instance (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.assume_test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.test (expand) | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes) | |
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T20:18:06.902+1200 [DEBUG] ReferenceTransformer: "local.users (expand)" references: [] | |
2021-04-15T20:18:06.902+1200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021-04-15T20:18:06.902+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.902+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test (expand)" references: [local.users (expand) data.aws_iam_policy_document.assume_test (expand)] | |
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test (expand)" references: [local.users (expand) aws_iam_policy.test (expand) aws_iam_role.test (expand)] | |
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance (expand)" references: [local.users (expand) data.aws_iam_policy_document.assume_test (expand)] | |
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test (expand)" references: [local.users (expand) data.aws_iam_policy_document.test (expand)] | |
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_test (expand)" references: [] | |
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test (expand)" references: [local.users (expand) aws_iam_role.instance (expand)] | |
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: data.aws_iam_policy_document.assume_test depends on [] | |
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: data.aws_iam_policy_document.test depends on [aws_iam_role.instance data.aws_iam_policy_document.assume_test] | |
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: aws_iam_role.test depends on [data.aws_iam_policy_document.assume_test] | |
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: aws_iam_role_policy_attachment.test depends on [aws_iam_policy.test aws_iam_role.instance aws_iam_role.test data.aws_iam_policy_document.assume_test data.aws_iam_policy_document.test] | |
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: aws_iam_role.instance depends on [data.aws_iam_policy_document.assume_test] | |
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: aws_iam_policy.test depends on [aws_iam_role.instance data.aws_iam_policy_document.assume_test data.aws_iam_policy_document.test] | |
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.attachDataResourceDependsOnTransformer | |
2021-04-15T20:18:06.903+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.assume_test depends on [] | |
2021-04-15T20:18:06.903+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.test depends on [aws_iam_role.instance data.aws_iam_policy_document.assume_test] | |
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.attachDataResourceDependsOnTransformer (no changes) | |
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "aws_iam_role.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "aws_iam_role_policy_attachment.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "aws_iam_role.instance (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "aws_iam_policy.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "data.aws_iam_policy_document.assume_test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "data.aws_iam_policy_document.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
local.users (expand) - *terraform.nodeExpandLocal | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021-04-15T20:18:06.904+1200 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource | |
local.users (expand) - *terraform.nodeExpandLocal | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021-04-15T20:18:06.904+1200 [DEBUG] Starting graph walk: walkPlan | |
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": starting visit (*terraform.nodeExpandLocal) | |
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": expanding dynamic subgraph | |
2021-04-15T20:18:06.904+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-04-15T20:18:06.904+1200 [TRACE] Expanding local: adding local.users as *terraform.NodeLocal | |
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": entering dynamic subgraph | |
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users": starting visit (*terraform.NodeLocal) | |
2021-04-15T20:18:06.904+1200 [DEBUG] created provider logger: level=trace | |
2021-04-15T20:18:06.904+1200 [INFO] provider: configuring client automatic mTLS | |
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users": visit complete | |
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": dynamic subgraph completed successfully | |
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": visit complete | |
2021-04-15T20:18:06.932+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5] | |
2021-04-15T20:18:06.944+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55776 | |
2021-04-15T20:18:06.944+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 | |
2021-04-15T20:18:06.987+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T20:18:06.987+1200 | |
2021-04-15T20:18:07.025+1200 [DEBUG] provider: using plugin: version=5 | |
2021-04-15T20:18:07.025+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin044736751 network=unix timestamp=2021-04-15T20:18:07.025+1200 | |
2021-04-15T20:18:07.067+1200 [TRACE] provider.stdio: waiting for stdio data | |
2021-04-15T20:18:07.067+1200 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T20:18:07.067+1200 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021-04-15T20:18:07.067+1200 [TRACE] GRPCProvider: GetProviderSchema | |
2021-04-15T20:18:07.135+1200 [TRACE] GRPCProvider: ValidateProviderConfig | |
2021-04-15T20:18:07.199+1200 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/hashicorp/aws\"]" changed the config value, but that value is unused | |
2021-04-15T20:18:07.199+1200 [TRACE] GRPCProvider: ConfigureProvider | |
2021-04-15T20:18:07.200+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:07 [INFO] assume_role configuration set: (ARN: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/terraform-admin", SessionID: "", ExternalID: ""): timestamp=2021-04-15T20:18:07.200+1200 | |
2021-04-15T20:18:07.200+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:07 [INFO] AWS Auth provider used: "EnvProvider": timestamp=2021-04-15T20:18:07.200+1200 | |
2021-04-15T20:18:07.200+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:07 [INFO] Attempting to AssumeRole arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/terraform-admin (SessionName: "", ExternalId: ""): timestamp=2021-04-15T20:18:07.200+1200 | |
2021-04-15T20:18:07.200+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:07 [DEBUG] [aws-sdk-go] DEBUG: Request sts/AssumeRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sts.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) | |
Content-Length: 159 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIAS6L2E357XNKKD4WM/20210415/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=8f1e1ab4caab9f987f894cc68113e4c7be2be9100765d4ea96a59d8f1b1772cd | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081807Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELH//////////wEaDDhYBKvUmG0Ba28LvyKGATvVQBWhqQFd8ebeXrEsDimzLl5lZIE1UhRrrioV+e6xZ4pI3QEv95mwz81YoZR6UfzzOy/NgNdKA8ur744gPPlEDXhrojqPdOf8qna4FVsWbWnNtMORw2bDpJpu8WkMffk/nHUnjVWDhomtZmNCmRhsQr8n8axEIRLYoaPXoaJaPGGsafiGKJXs3YMGMii9LOq5CCJ7jOKSyfF2nSlL9ohStopd4T9YL3IUCDqF5pLAzz/QJp1r | |
Accept-Encoding: gzip | |
Action=AssumeRole&DurationSeconds=900&RoleArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Arole%2Fterraform-admin&RoleSessionName=1618474687200630000&Version=2011-06-15 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:07.200+1200 | |
2021-04-15T20:18:08.466+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:08 [DEBUG] [aws-sdk-go] DEBUG: Response sts/AssumeRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 1092 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:08 GMT | |
X-Amzn-Requestid: 79c198b2-be4e-4004-9f54-9b3583ce78a3 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:08.466+1200 | |
2021-04-15T20:18:08.466+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:08 [DEBUG] [aws-sdk-go] <AssumeRoleResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
<AssumeRoleResult> | |
<AssumedRoleUser> | |
<AssumedRoleId>AROARF4HWBBNRYHWWXHE5:1618474687200630000</AssumedRoleId> | |
<Arn>arn:aws:sts::XXXXXXXXXXXXXXXXXXXXX:assumed-role/terraform-admin/1618474687200630000</Arn> | |
</AssumedRoleUser> | |
<Credentials> | |
<AccessKeyId>ASIARF4HWBBNUEFPMRXA</AccessKeyId> | |
<SecretAccessKey>fQOe29Fw/q4Ad4PXGyW0iBunFM5V1+8jKv/yOAmR</SecretAccessKey> | |
<SessionToken>FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==</SessionToken> | |
<Expiration>2021-04-15T08:33:08Z</Expiration> | |
</Credentials> | |
</AssumeRoleResult> | |
<ResponseMetadata> | |
<RequestId>79c198b2-be4e-4004-9f54-9b3583ce78a3</RequestId> | |
</ResponseMetadata> | |
</AssumeRoleResponse>: timestamp=2021-04-15T20:18:08.466+1200 | |
2021-04-15T20:18:08.468+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:08 [DEBUG] Trying to get account information via sts:GetCallerIdentity: timestamp=2021-04-15T20:18:08.468+1200 | |
2021-04-15T20:18:08.468+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:08 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sts.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 43 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=a2fa7b4b63b37bcbd884273b9cc0738c8f08468053eeb7a403d051556cd28edb | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081808Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetCallerIdentity&Version=2011-06-15 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:08.468+1200 | |
2021-04-15T20:18:09.344+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 460 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:08 GMT | |
X-Amzn-Requestid: ac851143-513a-461a-9d03-a553eeb7e14b | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.344+1200 | |
2021-04-15T20:18:09.344+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
<GetCallerIdentityResult> | |
<Arn>arn:aws:sts::XXXXXXXXXXXXXXXXXXXXX:assumed-role/terraform-admin/1618474687200630000</Arn> | |
<UserId>AROARF4HWBBNRYHWWXHE5:1618474687200630000</UserId> | |
<Account>XXXXXXXXXXXXXXXXXXXXX</Account> | |
</GetCallerIdentityResult> | |
<ResponseMetadata> | |
<RequestId>ac851143-513a-461a-9d03-a553eeb7e14b</RequestId> | |
</ResponseMetadata> | |
</GetCallerIdentityResponse>: timestamp=2021-04-15T20:18:09.344+1200 | |
2021-04-15T20:18:09.350+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: ec2.ap-southeast-2.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 87 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/ap-southeast-2/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=03dc098aa59edde989f2db66bf31cdabc13da562899cac44c41c97e21bd36968 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081809Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.350+1200 | |
2021-04-15T20:18:09.689+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 540 | |
Cache-Control: no-cache, no-store | |
Content-Type: text/xml;charset=UTF-8 | |
Date: Thu, 15 Apr 2021 08:18:09 GMT | |
Server: AmazonEC2 | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
X-Amzn-Requestid: d88bb04f-a8a9-4a7a-b0aa-1cf83fd670a1 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.689+1200 | |
2021-04-15T20:18:09.689+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
<DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
<requestId>d88bb04f-a8a9-4a7a-b0aa-1cf83fd670a1</requestId> | |
<accountAttributeSet> | |
<item> | |
<attributeName>supported-platforms</attributeName> | |
<attributeValueSet> | |
<item> | |
<attributeValue>VPC</attributeValue> | |
</item> | |
</attributeValueSet> | |
</item> | |
</accountAttributeSet> | |
</DescribeAccountAttributesResponse>: timestamp=2021-04-15T20:18:09.689+1200 | |
2021-04-15T20:18:09.689+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": expanding dynamic subgraph | |
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": entering dynamic subgraph | |
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": expanding dynamic subgraph | |
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T20:18:09.690+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.assume_test as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
data.aws_iam_policy_document.assume_test - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T20:18:09.690+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_test" references: [] | |
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021-04-15T20:18:09.690+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": entering dynamic subgraph | |
2021-04-15T20:18:09.690+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:09.690+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.assume_test | |
2021-04-15T20:18:09.691+1200 [TRACE] readDataSource: Re-validating config for data.aws_iam_policy_document.assume_test | |
2021-04-15T20:18:09.691+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig | |
2021-04-15T20:18:09.692+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:09.692+1200 | |
2021-04-15T20:18:09.692+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:09.692+1200 | |
2021-04-15T20:18:09.692+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:09.692+1200 | |
2021-04-15T20:18:09.692+1200 [TRACE] readDataSource: data.aws_iam_policy_document.assume_test configuration is complete, so reading from provider | |
2021-04-15T20:18:09.692+1200 [TRACE] GRPCProvider: ReadDataSource | |
2021-04-15T20:18:09.694+1200 [WARN] Provider "provider[\"registry.terraform.io/hashicorp/aws\"]" produced an unexpected new value for data.aws_iam_policy_document.assume_test. | |
- .version: was null, but now cty.StringVal("2012-10-17") | |
- .statement[0].effect: was null, but now cty.StringVal("Allow") | |
- .statement[0].not_actions: was null, but now cty.SetValEmpty(cty.String) | |
- .statement[0].not_resources: was null, but now cty.SetValEmpty(cty.String) | |
- .statement[0].resources: was null, but now cty.SetValEmpty(cty.String) | |
- .statement[0].sid: was null, but now cty.StringVal("") | |
2021-04-15T20:18:09.694+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.assume_test | |
2021-04-15T20:18:09.694+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.assume_test | |
2021-04-15T20:18:09.694+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.assume_test | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": visit complete | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": dynamic subgraph completed successfully | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": visit complete | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": dynamic subgraph completed successfully | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": visit complete | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.instance (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.test (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.test (expand)": expanding dynamic subgraph | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.instance (expand)": expanding dynamic subgraph | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.instance (expand)": entering dynamic subgraph | |
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.test (expand)": entering dynamic subgraph | |
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.test": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance": expanding dynamic subgraph | |
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T20:18:09.695+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.instance["bar"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:09.695+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.instance["baz"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:09.695+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.instance["foo"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_role.instance["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.instance["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.instance["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T20:18:09.695+1200 [DEBUG] Resource instance state not found for node "aws_iam_role.instance[\"baz\"]", instance aws_iam_role.instance["baz"] | |
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:09.695+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance[\"bar\"]" references: [] | |
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:09.695+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance[\"baz\"]" references: [] | |
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:09.695+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance[\"foo\"]" references: [] | |
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
aws_iam_role.instance["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.instance["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.instance["foo"] - *terraform.NodePlannableResourceInstance | |
root - terraform.graphNodeRoot | |
aws_iam_role.instance["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.instance["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.instance["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance": entering dynamic subgraph | |
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.test": expanding dynamic subgraph | |
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T20:18:09.695+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.instance["foo"] | |
2021-04-15T20:18:09.696+1200 [TRACE] vertex "aws_iam_role.instance[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:09.696+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.instance["bar"] | |
2021-04-15T20:18:09.696+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.test["bar"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:09.696+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.instance["baz"] | |
2021-04-15T20:18:09.696+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.test["baz"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:09.696+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.test["foo"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_role.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.test["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T20:18:09.696+1200 [DEBUG] Resource instance state not found for node "aws_iam_role.test[\"baz\"]", instance aws_iam_role.test["baz"] | |
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:09.696+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test[\"bar\"]" references: [] | |
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:09.696+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test[\"baz\"]" references: [] | |
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:09.696+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test[\"foo\"]" references: [] | |
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
aws_iam_role.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.test["foo"] - *terraform.NodePlannableResourceInstance | |
root - terraform.graphNodeRoot | |
aws_iam_role.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role.test["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:09.696+1200 [TRACE] vertex "aws_iam_role.test": entering dynamic subgraph | |
2021-04-15T20:18:09.696+1200 [TRACE] vertex "aws_iam_role.test[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:09.697+1200 [TRACE] vertex "aws_iam_role.test[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:09.697+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.test["foo"] | |
2021-04-15T20:18:09.697+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.test["foo"] is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T20:18:09.697+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T20:18:09.697+1200 [TRACE] readResourceInstanceState: no state present for aws_iam_role.instance["baz"] | |
2021-04-15T20:18:09.697+1200 [DEBUG] refresh: aws_iam_role.instance["baz"]: no state, so not refreshing | |
2021-04-15T20:18:09.697+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.instance["baz"] | |
2021-04-15T20:18:09.697+1200 [TRACE] writeResourceInstanceState: removing state object for aws_iam_role.instance["baz"] | |
2021-04-15T20:18:09.698+1200 [TRACE] vertex "aws_iam_role.test[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:09.698+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.test["baz"] | |
2021-04-15T20:18:09.698+1200 [TRACE] readResourceInstanceState: no state present for aws_iam_role.test["baz"] | |
2021-04-15T20:18:09.698+1200 [DEBUG] refresh: aws_iam_role.test["baz"]: no state, so not refreshing | |
2021-04-15T20:18:09.698+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.test["baz"] | |
2021-04-15T20:18:09.698+1200 [TRACE] writeResourceInstanceState: removing state object for aws_iam_role.test["baz"] | |
2021-04-15T20:18:09.699+1200 [TRACE] Re-validating config for "aws_iam_role.instance[\"baz\"]" | |
2021-04-15T20:18:09.699+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:09.699+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.instance["bar"] is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T20:18:09.699+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T20:18:09.699+1200 [TRACE] Re-validating config for "aws_iam_role.test[\"baz\"]" | |
2021-04-15T20:18:09.699+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:09.699+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.instance["foo"] is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T20:18:09.699+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T20:18:09.699+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.test["bar"] | |
2021-04-15T20:18:09.700+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.test["bar"] is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: PlanResourceChange | |
aws_iam_role.instance["bar"]: Refreshing state... [id=sebastian-instance-bar] | |
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: ReadResource | |
aws_iam_role.test["foo"]: Refreshing state... [id=sebastian-test-foo] | |
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: ReadResource | |
aws_iam_role.instance["foo"]: Refreshing state... [id=sebastian-instance-foo] | |
2021-04-15T20:18:09.701+1200 [TRACE] GRPCProvider: ReadResource | |
aws_iam_role.test["bar"]: Refreshing state... [id=sebastian-test-bar] | |
2021-04-15T20:18:09.701+1200 [TRACE] GRPCProvider: ReadResource | |
2021-04-15T20:18:09.701+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:09.701+1200 | |
2021-04-15T20:18:09.701+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:09.701+1200 | |
2021-04-15T20:18:09.701+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:09.701+1200 | |
2021-04-15T20:18:09.701+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.instance["baz"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .force_detach_policies: planned value cty.False for a non-computed attribute | |
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
- .inline_policy: attribute representing nested block must not be unknown itself; set nested attribute values to unknown instead | |
2021-04-15T20:18:09.701+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["baz"] | |
2021-04-15T20:18:09.701+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.test["baz"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
- .force_detach_policies: planned value cty.False for a non-computed attribute | |
- .inline_policy: attribute representing nested block must not be unknown itself; set nested attribute values to unknown instead | |
2021-04-15T20:18:09.701+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 61 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=4c4845118c575ce40151bb9e60416228da9a7d05cab789ecafb7c10e0a743b4d | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081809Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetRole&RoleName=sebastian-test-foo&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.701+1200 | |
2021-04-15T20:18:09.701+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["baz"] | |
2021-04-15T20:18:09.702+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 65 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=3143a2ed953a9e64ed1cc4c6aebcfe19dca3536eb85bfda43729637b2c152595 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081809Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetRole&RoleName=sebastian-instance-bar&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.701+1200 | |
2021-04-15T20:18:09.702+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 65 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=e53647a03fec419e40f2f7d304776a45496f79a055739d86474f89601aea998a | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081809Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetRole&RoleName=sebastian-instance-foo&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.701+1200 | |
2021-04-15T20:18:09.702+1200 [TRACE] writeChange: recorded Create change for aws_iam_role.instance["baz"] | |
2021-04-15T20:18:09.702+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:09.702+1200 | |
2021-04-15T20:18:09.702+1200 [TRACE] vertex "aws_iam_role.instance[\"baz\"]": visit complete | |
2021-04-15T20:18:09.702+1200 [TRACE] writeChange: recorded Create change for aws_iam_role.test["baz"] | |
2021-04-15T20:18:09.702+1200 [TRACE] vertex "aws_iam_role.test[\"baz\"]": visit complete | |
2021-04-15T20:18:09.702+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 61 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=809ea1867e9958c03c9328318382a1cd432b2c8e71da528d91ebec31d2663b13 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081809Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetRole&RoleName=sebastian-test-bar&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.702+1200 | |
2021-04-15T20:18:10.610+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 862 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:10 GMT | |
X-Amzn-Requestid: 4133af62-cdd3-4417-892f-624b78c08fa8 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.610+1200 | |
2021-04-15T20:18:10.610+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetRoleResult> | |
<Role> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A202656505727%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<MaxSessionDuration>3600</MaxSessionDuration> | |
<RoleId>AROARF4HWBBN3TTYU4P2C</RoleId> | |
<RoleLastUsed/> | |
<RoleName>sebastian-test-foo</RoleName> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-test-foo</Arn> | |
<CreateDate>2021-04-15T08:07:27Z</CreateDate> | |
</Role> | |
</GetRoleResult> | |
<ResponseMetadata> | |
<RequestId>4133af62-cdd3-4417-892f-624b78c08fa8</RequestId> | |
</ResponseMetadata> | |
</GetRoleResponse>: timestamp=2021-04-15T20:18:10.610+1200 | |
2021-04-15T20:18:10.610+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 870 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:09 GMT | |
X-Amzn-Requestid: 49ec0fe5-5ffc-4632-885a-4422cdbe5ef2 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.610+1200 | |
2021-04-15T20:18:10.610+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetRoleResult> | |
<Role> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A202656505727%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<MaxSessionDuration>3600</MaxSessionDuration> | |
<RoleId>AROARF4HWBBN4CZUJNLM2</RoleId> | |
<RoleLastUsed/> | |
<RoleName>sebastian-instance-bar</RoleName> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-bar</Arn> | |
<CreateDate>2021-04-15T08:13:10Z</CreateDate> | |
</Role> | |
</GetRoleResult> | |
<ResponseMetadata> | |
<RequestId>49ec0fe5-5ffc-4632-885a-4422cdbe5ef2</RequestId> | |
</ResponseMetadata> | |
</GetRoleResponse>: timestamp=2021-04-15T20:18:10.610+1200 | |
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 74 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=0a8996e8c21a7b779c52284a9726a2397950eb0737295652cfdb145aa8df72ab | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081810Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListRolePolicies&RoleName=sebastian-instance-bar&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.610+1200 | |
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 70 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=aeb739589b2012bb4997c973b1f73d7b3c11d66aafa8a917fca8835e1eca5478 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081810Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListRolePolicies&RoleName=sebastian-test-foo&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.611+1200 | |
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 870 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:09 GMT | |
X-Amzn-Requestid: 9a24a6a5-267f-4af4-88a9-14d11b13014f | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.611+1200 | |
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetRoleResult> | |
<Role> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A202656505727%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<MaxSessionDuration>3600</MaxSessionDuration> | |
<RoleId>AROARF4HWBBNUGW2EAT26</RoleId> | |
<RoleLastUsed/> | |
<RoleName>sebastian-instance-foo</RoleName> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-foo</Arn> | |
<CreateDate>2021-04-15T08:13:10Z</CreateDate> | |
</Role> | |
</GetRoleResult> | |
<ResponseMetadata> | |
<RequestId>9a24a6a5-267f-4af4-88a9-14d11b13014f</RequestId> | |
</ResponseMetadata> | |
</GetRoleResponse>: timestamp=2021-04-15T20:18:10.611+1200 | |
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 862 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:09 GMT | |
X-Amzn-Requestid: da3ca0d6-1e9c-404f-a44e-174c5e0a1b55 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.611+1200 | |
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetRoleResult> | |
<Role> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A202656505727%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<MaxSessionDuration>3600</MaxSessionDuration> | |
<RoleId>AROARF4HWBBNTZECDLEPK</RoleId> | |
<RoleLastUsed/> | |
<RoleName>sebastian-test-bar</RoleName> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-test-bar</Arn> | |
<CreateDate>2021-04-15T08:07:27Z</CreateDate> | |
</Role> | |
</GetRoleResult> | |
<ResponseMetadata> | |
<RequestId>da3ca0d6-1e9c-404f-a44e-174c5e0a1b55</RequestId> | |
</ResponseMetadata> | |
</GetRoleResponse>: timestamp=2021-04-15T20:18:10.611+1200 | |
2021-04-15T20:18:10.612+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 74 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=47d2239ad1283317b801aaa156f4a3ab972c379d0f224176bca0c27d067044bd | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081810Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListRolePolicies&RoleName=sebastian-instance-foo&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.612+1200 | |
2021-04-15T20:18:10.612+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 70 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=eda939d6cd3815101bd2f4a51c86180ca7a558fb7a5d50607b119e0a65e1d0d9 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081810Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListRolePolicies&RoleName=sebastian-test-bar&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.612+1200 | |
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 323 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:11 GMT | |
X-Amzn-Requestid: e3bf20ef-fa38-4f23-bc57-90534645c018 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 323 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:11 GMT | |
X-Amzn-Requestid: 19a7547b-d39d-492c-8034-700116ed5447 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<PolicyNames/> | |
</ListRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>19a7547b-d39d-492c-8034-700116ed5447</RequestId> | |
</ResponseMetadata> | |
</ListRolePoliciesResponse>: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 323 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:10 GMT | |
X-Amzn-Requestid: 623d8b1a-1c24-464a-8608-eef9d36e5846 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<PolicyNames/> | |
</ListRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>623d8b1a-1c24-464a-8608-eef9d36e5846</RequestId> | |
</ResponseMetadata> | |
</ListRolePoliciesResponse>: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 323 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:10 GMT | |
X-Amzn-Requestid: d3e48d49-a108-4f95-bfea-72b9c89937c8 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<PolicyNames/> | |
</ListRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>d3e48d49-a108-4f95-bfea-72b9c89937c8</RequestId> | |
</ResponseMetadata> | |
</ListRolePoliciesResponse>: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<PolicyNames/> | |
</ListRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>e3bf20ef-fa38-4f23-bc57-90534645c018</RequestId> | |
</ResponseMetadata> | |
</ListRolePoliciesResponse>: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.547+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 78 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=b1be52b7d20be8526c69284d0b4944b87d83c00ecf0abb5a0dc52884f70352ef | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081811Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=sebastian-test-bar&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200 | |
2021-04-15T20:18:11.547+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 82 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=e2a2cb5fb7f03aeb9f0cf258120cad11563f23fde1feebefa8a3fd12c72b25a0 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081811Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=sebastian-instance-foo&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.547+1200 | |
2021-04-15T20:18:11.547+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 82 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=c16f58d08d6282960c61ac1a17751fefc7fc82e6bfdaf226f796087ce35877af | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081811Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=sebastian-instance-bar&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.547+1200 | |
2021-04-15T20:18:11.547+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 78 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=38c0f981ad9e21200b839ee2a004f9bbb269490a3b175b58016b43444f0a495d | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081811Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=sebastian-test-foo&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.547+1200 | |
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "data.aws_iam_policy_document.test (expand)" is waiting for "aws_iam_role.instance (expand)" | |
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.test (expand)" | |
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.test (expand)" is waiting for "aws_iam_role.test (expand)" | |
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "root" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "aws_iam_role_policy_attachment.test (expand)" | |
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "aws_iam_policy.test (expand)" is waiting for "data.aws_iam_policy_document.test (expand)" | |
2021-04-15T20:18:12.497+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 360 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:12 GMT | |
X-Amzn-Requestid: ff5dc254-6331-47bf-a1b6-c3082df1ab81 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.497+1200 | |
2021-04-15T20:18:12.497+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies/> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>ff5dc254-6331-47bf-a1b6-c3082df1ab81</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:12.497+1200 | |
2021-04-15T20:18:12.497+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 549 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:12 GMT | |
X-Amzn-Requestid: 55cec858-a1c9-44f8-99d3-0bd1158aedbd | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.497+1200 | |
2021-04-15T20:18:12.498+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies> | |
<member> | |
<PolicyArn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo</PolicyArn> | |
<PolicyName>sebastian-test=foo</PolicyName> | |
</member> | |
</AttachedPolicies> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>55cec858-a1c9-44f8-99d3-0bd1158aedbd</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:12.497+1200 | |
2021-04-15T20:18:12.498+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.test["foo"] | |
2021-04-15T20:18:12.498+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["foo"] | |
2021-04-15T20:18:12.498+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for aws_iam_role.instance["foo"] during refresh. | |
- .tags: was null, but now cty.MapValEmpty(cty.String) | |
2021-04-15T20:18:12.499+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.instance["foo"] | |
2021-04-15T20:18:12.499+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["foo"] | |
2021-04-15T20:18:12.499+1200 [TRACE] Re-validating config for "aws_iam_role.test[\"foo\"]" | |
2021-04-15T20:18:12.499+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:12.500+1200 [TRACE] Re-validating config for "aws_iam_role.instance[\"foo\"]" | |
2021-04-15T20:18:12.500+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:12.500+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:12.500+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:12.501+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.test["foo"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .force_detach_policies: planned value cty.False for a non-computed attribute | |
2021-04-15T20:18:12.502+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.instance["foo"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .force_detach_policies: planned value cty.False for a non-computed attribute | |
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
2021-04-15T20:18:12.502+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["foo"] | |
2021-04-15T20:18:12.502+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["foo"] | |
2021-04-15T20:18:12.502+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role.instance["foo"] | |
2021-04-15T20:18:12.502+1200 [TRACE] vertex "aws_iam_role.instance[\"foo\"]": visit complete | |
2021-04-15T20:18:12.502+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role.test["foo"] | |
2021-04-15T20:18:12.502+1200 [TRACE] vertex "aws_iam_role.test[\"foo\"]": visit complete | |
2021-04-15T20:18:12.503+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 360 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:11 GMT | |
X-Amzn-Requestid: 00b712e1-02bd-4eff-b3e0-65ec5dc8f516 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.502+1200 | |
2021-04-15T20:18:12.503+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies/> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>00b712e1-02bd-4eff-b3e0-65ec5dc8f516</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:12.503+1200 | |
2021-04-15T20:18:12.503+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for aws_iam_role.instance["bar"] during refresh. | |
- .tags: was null, but now cty.MapValEmpty(cty.String) | |
2021-04-15T20:18:12.503+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.instance["bar"] | |
2021-04-15T20:18:12.503+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["bar"] | |
2021-04-15T20:18:12.504+1200 [TRACE] Re-validating config for "aws_iam_role.instance[\"bar\"]" | |
2021-04-15T20:18:12.504+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:12.504+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 549 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:12 GMT | |
X-Amzn-Requestid: 2391f69c-1305-43c8-9a83-1ba7dfff7727 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.504+1200 | |
2021-04-15T20:18:12.504+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies> | |
<member> | |
<PolicyArn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar</PolicyArn> | |
<PolicyName>sebastian-test=bar</PolicyName> | |
</member> | |
</AttachedPolicies> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>2391f69c-1305-43c8-9a83-1ba7dfff7727</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:12.504+1200 | |
2021-04-15T20:18:12.505+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:12.505+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.test["bar"] | |
2021-04-15T20:18:12.505+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["bar"] | |
2021-04-15T20:18:12.505+1200 [TRACE] Re-validating config for "aws_iam_role.test[\"bar\"]" | |
2021-04-15T20:18:12.505+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:12.505+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.instance["bar"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .force_detach_policies: planned value cty.False for a non-computed attribute | |
2021-04-15T20:18:12.505+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["bar"] | |
2021-04-15T20:18:12.506+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:12.506+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role.instance["bar"] | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance[\"bar\"]": visit complete | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance": dynamic subgraph completed successfully | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance": visit complete | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance (expand)": dynamic subgraph completed successfully | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance (expand)": visit complete | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": expanding dynamic subgraph | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": entering dynamic subgraph | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test": expanding dynamic subgraph | |
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T20:18:12.506+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.test["bar"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:12.506+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.test["baz"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:12.506+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.test["foo"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:12.506+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
data.aws_iam_policy_document.test["bar"] - *terraform.NodePlannableResourceInstance | |
data.aws_iam_policy_document.test["baz"] - *terraform.NodePlannableResourceInstance | |
data.aws_iam_policy_document.test["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T20:18:12.506+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T20:18:12.506+1200 [DEBUG] Resource instance state not found for node "data.aws_iam_policy_document.test[\"baz\"]", instance data.aws_iam_policy_document.test["baz"] | |
2021-04-15T20:18:12.506+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T20:18:12.506+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.instance" | |
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.506+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test[\"bar\"]" references: [] | |
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.instance" | |
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.506+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test[\"baz\"]" references: [] | |
2021-04-15T20:18:12.507+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:12.507+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.instance" | |
2021-04-15T20:18:12.507+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.507+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test[\"foo\"]" references: [] | |
2021-04-15T20:18:12.507+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T20:18:12.507+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T20:18:12.507+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.test["bar"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .force_detach_policies: planned value cty.False for a non-computed attribute | |
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
2021-04-15T20:18:12.507+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
data.aws_iam_policy_document.test["bar"] - *terraform.NodePlannableResourceInstance | |
data.aws_iam_policy_document.test["baz"] - *terraform.NodePlannableResourceInstance | |
data.aws_iam_policy_document.test["foo"] - *terraform.NodePlannableResourceInstance | |
root - terraform.graphNodeRoot | |
data.aws_iam_policy_document.test["bar"] - *terraform.NodePlannableResourceInstance | |
data.aws_iam_policy_document.test["baz"] - *terraform.NodePlannableResourceInstance | |
data.aws_iam_policy_document.test["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "data.aws_iam_policy_document.test": entering dynamic subgraph | |
2021-04-15T20:18:12.507+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["bar"] | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:12.507+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.test["baz"] | |
2021-04-15T20:18:12.507+1200 [TRACE] readResourceInstanceState: no state present for data.aws_iam_policy_document.test["baz"] | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:12.507+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.test["foo"] | |
2021-04-15T20:18:12.507+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.test["bar"] | |
2021-04-15T20:18:12.507+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role.test["bar"] | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test[\"bar\"]": visit complete | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test": dynamic subgraph completed successfully | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test": visit complete | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test (expand)": dynamic subgraph completed successfully | |
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test (expand)": visit complete | |
2021-04-15T20:18:12.508+1200 [TRACE] planDataSource: data.aws_iam_policy_document.test["baz"] configuration not fully known yet, so deferring to apply phase | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.test["baz"] | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["baz"] | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["baz"] | |
2021-04-15T20:18:12.508+1200 [TRACE] planDataSource: data.aws_iam_policy_document.test["bar"] configuration is fully known, but we're forcing a read plan to be created | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.test["bar"] | |
2021-04-15T20:18:12.508+1200 [TRACE] writeChange: recorded Read change for data.aws_iam_policy_document.test["baz"] | |
2021-04-15T20:18:12.508+1200 [TRACE] planDataSource: data.aws_iam_policy_document.test["foo"] configuration is fully known, but we're forcing a read plan to be created | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.test["foo"] | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["bar"] | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"baz\"]": visit complete | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["foo"] | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["bar"] | |
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["foo"] | |
2021-04-15T20:18:12.508+1200 [TRACE] writeChange: recorded Read change for data.aws_iam_policy_document.test["bar"] | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"bar\"]": visit complete | |
2021-04-15T20:18:12.508+1200 [TRACE] writeChange: recorded Read change for data.aws_iam_policy_document.test["foo"] | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_poliaws_iam_policy.test["foo"]: Refreshing state... [id=arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo] | |
cy_document.test[\"foo\"]": visit complete | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test": dynamic subgraph completed successfully | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test": visit complete | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": dynamic subgraph completed successfully | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": visit complete | |
2021-04-15T20:18:12.508+1200 [TRACE] vertex "aws_iam_policy.test (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test (expand)": expanding dynamic subgraph | |
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test (expand)": entering dynamic subgraph | |
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test": expanding dynamic subgraph | |
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T20:18:12.509+1200 [TRACE] ResourceCountTransformer: adding aws_iam_policy.test["bar"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:12.509+1200 [TRACE] ResourceCountTransformer: adding aws_iam_policy.test["baz"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:12.509+1200 [TRACE] ResourceCountTransformer: adding aws_iam_policy.test["foo"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_policy.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_policy.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_policy.test["foo"] - *terraform.NodePlannableResourceIaws_iam_policy.test["bar"]: Refreshing state... [id=arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar] | |
nstance | |
------ | |
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T20:18:12.509+1200 [DEBUG] Resource instance state not found for node "aws_iam_policy.test[\"baz\"]", instance aws_iam_policy.test["baz"] | |
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "data.aws_iam_policy_document.test" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.509+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test[\"bar\"]" references: [] | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "data.aws_iam_policy_document.test" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.509+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test[\"baz\"]" references: [] | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "data.aws_iam_policy_document.test" | |
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:12.509+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test[\"foo\"]" references: [] | |
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
aws_iam_policy.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_policy.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_policy.test["foo"] - *terraform.NodePlannableResourceInstance | |
root - terraform.graphNodeRoot | |
aws_iam_policy.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_policy.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_policy.test["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test": entering dynamic subgraph | |
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:12.509+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_policy.test["bar"] | |
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:12.509+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_policy.test["baz"] | |
2021-04-15T20:18:12.509+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_policy.test["foo"] | |
2021-04-15T20:18:12.509+1200 [TRACE] readResourceInstanceState: no state present for aws_iam_policy.test["baz"] | |
2021-04-15T20:18:12.509+1200 [TRACE] upgradeResourceState: schema version of aws_iam_policy.test["foo"] is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T20:18:12.509+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T20:18:12.509+1200 [DEBUG] refresh: aws_iam_policy.test["baz"]: no state, so not refreshing | |
2021-04-15T20:18:12.509+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_policy.test["baz"] | |
2021-04-15T20:18:12.509+1200 [TRACE] writeResourceInstanceState: removing state object for aws_iam_policy.test["baz"] | |
2021-04-15T20:18:12.509+1200 [TRACE] upgradeResourceState: schema version of aws_iam_policy.test["bar"] is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T20:18:12.509+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T20:18:12.510+1200 [TRACE] Re-validating config for "aws_iam_policy.test[\"baz\"]" | |
2021-04-15T20:18:12.510+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:12.510+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:12.511+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_policy.test["baz"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
2021-04-15T20:18:12.511+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["baz"] | |
2021-04-15T20:18:12.511+1200 [TRACE] writeChange: recorded Create change for aws_iam_policy.test["baz"] | |
2021-04-15T20:18:12.511+1200 [TRACE] vertex "aws_iam_policy.test[\"baz\"]": visit complete | |
2021-04-15T20:18:12.512+1200 [TRACE] GRPCProvider: ReadResource | |
2021-04-15T20:18:12.512+1200 [TRACE] GRPCProvider: ReadResource | |
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] Getting IAM Policy: { | |
PolicyArn: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo" | |
}: timestamp=2021-04-15T20:18:12.512+1200 | |
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:12.512+1200 | |
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] Getting IAM Policy: { | |
PolicyArn: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar" | |
}: timestamp=2021-04-15T20:18:12.512+1200 | |
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:12.512+1200 | |
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicy Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 111 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=d44e5477a89a0e65766b3527afd016042307149a461514bf04370f536d0d598d | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081812Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetPolicy&PolicyArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Apolicy%2Fsebastian-test%3Dfoo&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.512+1200 | |
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicy Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 111 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=2eeba250183a8d4c7c391701139ccdb180dc39e690d2e3988fa319d543320c21 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081812Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetPolicy&PolicyArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Apolicy%2Fsebastian-test%3Dbar&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.512+1200 | |
2021-04-15T20:18:13.489+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicy Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 773 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:12 GMT | |
X-Amzn-Requestid: d69ef89f-2ef5-4030-8d31-6403497312e6 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:13.489+1200 | |
2021-04-15T20:18:13.489+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] <GetPolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetPolicyResult> | |
<Policy> | |
<PermissionsBoundaryUsageCount>0</PermissionsBoundaryUsageCount> | |
<Path>/</Path> | |
<UpdateDate>2021-04-15T08:13:15Z</UpdateDate> | |
<PolicyId>ANPARF4HWBBNR5ZRPI7GS</PolicyId> | |
<DefaultVersionId>v2</DefaultVersionId> | |
<PolicyName>sebastian-test=foo</PolicyName> | |
<IsAttachable>true</IsAttachable> | |
<AttachmentCount>1</AttachmentCount> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo</Arn> | |
<CreateDate>2021-04-15T08:09:01Z</CreateDate> | |
<Tags/> | |
</Policy> | |
</GetPolicyResult> | |
<ResponseMetadata> | |
<RequestId>d69ef89f-2ef5-4030-8d31-6403497312e6</RequestId> | |
</ResponseMetadata> | |
</GetPolicyResponse>: timestamp=2021-04-15T20:18:13.489+1200 | |
2021-04-15T20:18:13.489+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicy Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 773 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:13 GMT | |
X-Amzn-Requestid: 95e3bf53-59ad-4829-9893-2c04185825aa | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:13.489+1200 | |
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] <GetPolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetPolicyResult> | |
<Policy> | |
<PermissionsBoundaryUsageCount>0</PermissionsBoundaryUsageCount> | |
<Path>/</Path> | |
<UpdateDate>2021-04-15T08:13:15Z</UpdateDate> | |
<PolicyId>ANPARF4HWBBN5GGMTMGSD</PolicyId> | |
<DefaultVersionId>v2</DefaultVersionId> | |
<PolicyName>sebastian-test=bar</PolicyName> | |
<IsAttachable>true</IsAttachable> | |
<AttachmentCount>1</AttachmentCount> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar</Arn> | |
<CreateDate>2021-04-15T08:09:03Z</CreateDate> | |
<Tags/> | |
</Policy> | |
</GetPolicyResult> | |
<ResponseMetadata> | |
<RequestId>95e3bf53-59ad-4829-9893-2c04185825aa</RequestId> | |
</ResponseMetadata> | |
</GetPolicyResponse>: timestamp=2021-04-15T20:18:13.489+1200 | |
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] Getting IAM Policy Version: { | |
PolicyArn: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo", | |
VersionId: "v2" | |
}: timestamp=2021-04-15T20:18:13.489+1200 | |
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:13.489+1200 | |
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] Getting IAM Policy Version: { | |
PolicyArn: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar", | |
VersionId: "v2" | |
}: timestamp=2021-04-15T20:18:13.489+1200 | |
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:13.489+1200 | |
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicyVersion Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 131 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=8dedf966c1c08ebe2aca4b7baee88020ec2d60a8488c6f71e74fa4108123b2cb | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081813Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetPolicyVersion&PolicyArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Apolicy%2Fsebastian-test%3Dfoo&Version=2010-05-08&VersionId=v2 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:13.490+1200 | |
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicyVersion Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 131 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=10a0bc4083642dc1eff4fb22dacaa5aea2906f43f050bb6ac591596d0e191d9d | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081813Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=GetPolicyVersion&PolicyArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Apolicy%2Fsebastian-test%3Dbar&Version=2010-05-08&VersionId=v2 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:13.490+1200 | |
2021-04-15T20:18:14.589+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicyVersion Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 884 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:14 GMT | |
X-Amzn-Requestid: ee933c86-6888-4804-8e01-5dc525b10079 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:14.589+1200 | |
2021-04-15T20:18:14.589+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] <GetPolicyVersionResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetPolicyVersionResult> | |
<PolicyVersion> | |
<VersionId>v2</VersionId> | |
<IsDefaultVersion>true</IsDefaultVersion> | |
<Document>%7B%0A%20%20%22Version%22%3A%20%222012-10-17%22%2C%0A%20%20%22Statement%22%3A%20%5B%0A%20%20%20%20%7B%0A%20%20%20%20%20%20%22Sid%22%3A%20%22SetRole%22%2C%0A%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%22Action%22%3A%20%22iam%3APassRole%22%2C%0A%20%20%20%20%20%20%22Resource%22%3A%20%22arn%3Aaws%3Aiam%3A%3A081352067163%3Arole%2Fsebastian-instance-bar%22%0A%20%20%20%20%7D%0A%20%20%5D%0A%7D</Document> | |
<CreateDate>2021-04-15T08:13:15Z</CreateDate> | |
</PolicyVersion> | |
</GetPolicyVersionResult> | |
<ResponseMetadata> | |
<RequestId>ee933c86-6888-4804-8e01-5dc525b10079</RequestId> | |
</ResponseMetadata> | |
</GetPolicyVersionResponse>: timestamp=2021-04-15T20:18:14.589+1200 | |
2021-04-15T20:18:14.589+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicyVersion Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 884 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:13 GMT | |
X-Amzn-Requestid: 9fca6027-d20d-4faa-a8bd-b72dc315d2cf | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:14.589+1200 | |
2021-04-15T20:18:14.589+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] <GetPolicyVersionResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetPolicyVersionResult> | |
<PolicyVersion> | |
<VersionId>v2</VersionId> | |
<IsDefaultVersion>true</IsDefaultVersion> | |
<Document>%7B%0A%20%20%22Version%22%3A%20%222012-10-17%22%2C%0A%20%20%22Statement%22%3A%20%5B%0A%20%20%20%20%7B%0A%20%20%20%20%20%20%22Sid%22%3A%20%22SetRole%22%2C%0A%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%22Action%22%3A%20%22iam%3APassRole%22%2C%0A%20%20%20%20%20%20%22Resource%22%3A%20%22arn%3Aaws%3Aiam%3A%3A081352067163%3Arole%2Fsebastian-instance-foo%22%0A%20%20%20%20%7D%0A%20%20%5D%0A%7D</Document> | |
<CreateDate>2021-04-15T08:13:15Z</CreateDate> | |
</PolicyVersion> | |
</GetPolicyVersionResult> | |
<ResponseMetadata> | |
<RequestId>9fca6027-d20d-4faa-a8bd-b72dc315d2cf</RequestId> | |
</ResponseMetadata> | |
</GetPolicyVersionResponse>: timestamp=2021-04-15T20:18:14.589+1200 | |
2021-04-15T20:18:14.590+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_policy.test["foo"] | |
2021-04-15T20:18:14.590+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["foo"] | |
2021-04-15T20:18:14.590+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_policy.test["bar"] | |
2021-04-15T20:18:14.590+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["bar"] | |
2021-04-15T20:18:14.590+1200 [TRACE] Re-validating config for "aws_iam_policy.test[\"foo\"]" | |
2021-04-15T20:18:14.590+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:14.590+1200 [TRACE] Re-validating config for "aws_iam_policy.test[\"bar\"]" | |
2021-04-15T20:18:14.590+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:14.591+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:14.591+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:14.592+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_policy.test["bar"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
2021-04-15T20:18:14.592+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_policy.test["foo"], but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .description: planned value cty.StringVal("") for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
aws_iam_role_policy_attachment.test["foo"]: Refreshing state... [id=sebastian-test-foo-20210415080908613900000001] | |
2021-04-15T20:18:14.592+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["bar"] | |
2021-04-15T20:18:14.592+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["foo"] | |
2021-04-15T20:18:14.592+1200 [TRACE] writeChange: recorded Update change for aws_iam_policy.test["bar"] | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test[\"bar\"]": visit complete | |
2021-04-15T20:18:14.592+1200 [TRACE] writeChange: recorded Update change for aws_iam_policy.test["foo"] | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test[\"foo\"]": visit complete | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test": dynamic subgraph completed successfully | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test": visit complete | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test (expand)": dynamic subgraph completed successfully | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test (expand)": visit complete | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": expanding dynamic subgraph | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": entering dynamic subgraph | |
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": expanding dynamic subgraph | |
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T20:18:14.593+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role_policy_attachment.test["bar"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:14.593+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role_policy_attaws_iam_role_policy_attachment.test["bar"]: Refreshing state... [id=sebastian-test-bar-20210415080908630300000002] | |
achment.test["baz"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:14.593+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role_policy_attachment.test["foo"] as *terraform.NodePlannableResourceInstance | |
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_role_policy_attachment.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role_policy_attachment.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role_policy_attachment.test["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T20:18:14.593+1200 [DEBUG] Resource instance state not found for node "aws_iam_role_policy_attachment.test[\"baz\"]", instance aws_iam_role_policy_attachment.test["baz"] | |
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_policy.test" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.test" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:14.593+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test[\"baz\"]" references: [] | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_policy.test" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.test" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:14.593+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test[\"foo\"]" references: [] | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "local.users" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_policy.test" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.test" | |
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key" | |
2021-04-15T20:18:14.593+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test[\"bar\"]" references: [] | |
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph: | |
aws_iam_role_policy_attachment.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role_policy_attachment.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role_policy_attachment.test["foo"] - *terraform.NodePlannableResourceInstance | |
root - terraform.graphNodeRoot | |
aws_iam_role_policy_attachment.test["bar"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role_policy_attachment.test["baz"] - *terraform.NodePlannableResourceInstance | |
aws_iam_role_policy_attachment.test["foo"] - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": entering dynamic subgraph | |
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T20:18:14.593+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role_policy_attachment.test["bar"] | |
2021-04-15T20:18:14.594+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role_policy_attachment.test["baz"] | |
2021-04-15T20:18:14.594+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role_policy_attachment.test["foo"] | |
2021-04-15T20:18:14.594+1200 [TRACE] readResourceInstanceState: no state present for aws_iam_role_policy_attachment.test["baz"] | |
2021-04-15T20:18:14.594+1200 [DEBUG] refresh: aws_iam_role_policy_attachment.test["baz"]: no state, so not refreshing | |
2021-04-15T20:18:14.594+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role_policy_attachment.test["bar"] is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T20:18:14.594+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T20:18:14.594+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role_policy_attachment.test["foo"] is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T20:18:14.594+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T20:18:14.594+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role_policy_attachment.test["baz"] | |
2021-04-15T20:18:14.594+1200 [TRACE] writeResourceInstanceState: removing state object for aws_iam_role_policy_attachment.test["baz"] | |
2021-04-15T20:18:14.594+1200 [TRACE] Re-validating config for "aws_iam_role_policy_attachment.test[\"baz\"]" | |
2021-04-15T20:18:14.594+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:14.595+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:14.595+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["baz"] | |
2021-04-15T20:18:14.595+1200 [TRACE] writeChange: recorded Create change for aws_iam_role_policy_attachment.test["baz"] | |
2021-04-15T20:18:14.595+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"baz\"]": visit complete | |
2021-04-15T20:18:14.596+1200 [TRACE] GRPCProvider: ReadResource | |
2021-04-15T20:18:14.596+1200 [TRACE] GRPCProvider: ReadResource | |
2021-04-15T20:18:14.597+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:14.597+1200 | |
2021-04-15T20:18:14.597+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:14.597+1200 | |
2021-04-15T20:18:14.597+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 78 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=6da8ad08ed4dfde0f97bdb99ce50d8d8e347da00c92d5a877aae5181b9a9b697 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081814Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=sebastian-test-foo&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:14.597+1200 | |
2021-04-15T20:18:14.597+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 78 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=75b39516e10f54da901ffcb39b8541cc9a177a04c5d4d492ce2f6f6a103c579c | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T081814Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA== | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=sebastian-test-bar&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:14.597+1200 | |
2021-04-15T20:18:15.642+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:15 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 549 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:14 GMT | |
X-Amzn-Requestid: d4a7cff0-7689-42d2-bf6e-0e53222d25aa | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:15.641+1200 | |
2021-04-15T20:18:15.642+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:15 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 549 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 08:18:15 GMT | |
X-Amzn-Requestid: fdc7879a-c86b-4c4c-846a-444e2b30ba45 | |
-----------------------------------------------------: timestamp=2021-04-15T20:18:15.641+1200 | |
2021-04-15T20:18:15.642+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:15 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies> | |
<member> | |
<PolicyArn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar</PolicyArn> | |
<PolicyName>sebastian-test=bar</PolicyName> | |
</member> | |
</AttachedPolicies> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>fdc7879a-c86b-4c4c-846a-444e2b30ba45</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:15.641+1200 | |
2021-04-15T20:18:15.642+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:15 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies> | |
<member> | |
<PolicyArn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo</PolicyArn> | |
<PolicyName>sebastian-test=foo</PolicyName> | |
</member> | |
</AttachedPolicies> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>d4a7cff0-7689-42d2-bf6e-0e53222d25aa</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:15.641+1200 | |
2021-04-15T20:18:15.642+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role_policy_attachment.test["foo"] | |
2021-04-15T20:18:15.642+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["foo"] | |
2021-04-15T20:18:15.642+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role_policy_attachment.test["bar"] | |
2021-04-15T20:18:15.642+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["bar"] | |
2021-04-15T20:18:15.643+1200 [TRACE] Re-validating config for "aws_iam_role_policy_attachment.test[\"foo\"]" | |
2021-04-15T20:18:15.643+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:15.643+1200 [TRACE] Re-validating config for "aws_iam_role_policy_attachment.test[\"bar\"]" | |
2021-04-15T20:18:15.643+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T20:18:15.644+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:15.644+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T20:18:15.644+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["foo"] | |
2021-04-15T20:18:15.644+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role_policy_attachment.test["foo"] | |
2021-04-15T20:18:15.644+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"foo\"]": visit complete | |
2021-04-15T20:18:15.644+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["bar"] | |
2021-04-15T20:18:15.644+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role_policy_attachment.test["bar"] | |
2021-04-15T20:18:15.644+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"bar\"]": visit complete | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot) | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": dynamic subgraph completed successfully | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": visit complete | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": dynamic subgraph completed successfully | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": visit complete | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021-04-15T20:18:15.645+1200 [TRACE] GRPCProvider: Close | |
2021-04-15T20:18:15.645+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-04-15T20:18:15.645+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-04-15T20:18:15.650+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55776 | |
2021-04-15T20:18:15.650+1200 [DEBUG] provider: plugin exited | |
2021-04-15T20:18:15.650+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021-04-15T20:18:15.650+1200 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021-04-15T20:18:15.650+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T20:18:15.650+1200 [INFO] backend/local: plan operation completed | |
2021-04-15T20:18:15.650+1200 [INFO] backend/local: writing plan output to: plan | |
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following | |
symbols: | |
+ create | |
~ update in-place | |
<= read (data resources) | |
Terraform will perform the following actions: | |
# data.aws_iam_policy_document.test["bar"] will be read during apply | |
# (config refers to values not yet known) | |
<= data "aws_iam_policy_document" "test" { | |
~ id = "3285458131" -> (known after apply) | |
~ json = jsonencode( | |
{ | |
- Statement = [ | |
- { | |
- Action = "iam:PassRole" | |
- Effect = "Allow" | |
- Resource = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-bar" | |
- Sid = "SetRole" | |
}, | |
] | |
- Version = "2012-10-17" | |
} | |
) -> (known after apply) | |
- version = "2012-10-17" -> null | |
~ statement { | |
- effect = "Allow" -> null | |
- not_actions = [] -> null | |
- not_resources = [] -> null | |
# (3 unchanged attributes hidden) | |
} | |
} | |
# data.aws_iam_policy_document.test["baz"] will be read during apply | |
# (config refers to values not yet known) | |
<= data "aws_iam_policy_document" "test" { | |
+ id = (known after apply) | |
+ json = (known after apply) | |
+ statement { | |
+ actions = [ | |
+ "iam:PassRole", | |
] | |
+ resources = [ | |
+ (known after apply), | |
] | |
+ sid = "SetRole" | |
} | |
} | |
# data.aws_iam_policy_document.test["foo"] will be read during apply | |
# (config refers to values not yet known) | |
<= data "aws_iam_policy_document" "test" { | |
~ id = "735970326" -> (known after apply) | |
~ json = jsonencode( | |
{ | |
- Statement = [ | |
- { | |
- Action = "iam:PassRole" | |
- Effect = "Allow" | |
- Resource = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-foo" | |
- Sid = "SetRole" | |
}, | |
] | |
- Version = "2012-10-17" | |
} | |
) -> (known after apply) | |
- version = "2012-10-17" -> null | |
~ statement { | |
- effect = "Allow" -> null | |
- not_actions = [] -> null | |
- not_resources = [] -> null | |
# (3 unchanged attributes hidden) | |
} | |
} | |
# aws_iam_policy.test["bar"] will be updated in-place | |
~ resource "aws_iam_policy" "test" { | |
id = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar" | |
name = "sebastian-test=bar" | |
~ policy = jsonencode( | |
{ | |
- Statement = [ | |
- { | |
- Action = "iam:PassRole" | |
- Effect = "Allow" | |
- Resource = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-bar" | |
- Sid = "SetRole" | |
}, | |
] | |
- Version = "2012-10-17" | |
} | |
) -> (known after apply) | |
tags = {} | |
# (3 unchanged attributes hidden) | |
} | |
# aws_iam_policy.test["baz"] will be created | |
+ resource "aws_iam_policy" "test" { | |
+ arn = (known after apply) | |
+ id = (known after apply) | |
+ name = "sebastian-test=baz" | |
+ path = "/" | |
+ policy = (known after apply) | |
+ policy_id = (known after apply) | |
} | |
# aws_iam_policy.test["foo"] will be updated in-place | |
~ resource "aws_iam_policy" "test" { | |
id = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo" | |
name = "sebastian-test=foo" | |
~ policy = jsonencode( | |
{ | |
- Statement = [ | |
- { | |
- Action = "iam:PassRole" | |
- Effect = "Allow" | |
- Resource = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-foo" | |
- Sid = "SetRole" | |
}, | |
] | |
- Version = "2012-10-17" | |
} | |
) -> (known after apply) | |
tags = {} | |
# (3 unchanged attributes hidden) | |
} | |
# aws_iam_role.instance["baz"] will be created | |
+ resource "aws_iam_role" "instance" { | |
+ arn = (known after apply) | |
+ assume_role_policy = jsonencode( | |
{ | |
+ Statement = [ | |
+ { | |
+ Action = "sts:AssumeRole" | |
+ Effect = "Allow" | |
+ Principal = { | |
+ AWS = "arn:aws:iam::YYYYYYYYYYYYYYYY:root" | |
} | |
+ Sid = "" | |
}, | |
] | |
+ Version = "2012-10-17" | |
} | |
) | |
+ create_date = (known after apply) | |
+ force_detach_policies = false | |
+ id = (known after apply) | |
+ managed_policy_arns = (known after apply) | |
+ max_session_duration = 3600 | |
+ name = "sebastian-instance-baz" | |
+ path = "/" | |
+ unique_id = (known after apply) | |
+ inline_policy { | |
+ name = (known after apply) | |
+ policy = (known after apply) | |
} | |
} | |
# aws_iam_role.test["baz"] will be created | |
+ resource "aws_iam_role" "test" { | |
+ arn = (known after apply) | |
+ assume_role_policy = jsonencode( | |
{ | |
+ Statement = [ | |
+ { | |
+ Action = "sts:AssumeRole" | |
+ Effect = "Allow" | |
+ Principal = { | |
+ AWS = "arn:aws:iam::YYYYYYYYYYYYYYYY:root" | |
} | |
+ Sid = "" | |
}, | |
] | |
+ Version = "2012-10-17" | |
} | |
) | |
+ create_date = (known after apply) | |
+ force_detach_policies = false | |
+ id = (known after apply) | |
+ managed_policy_arns = (known after apply) | |
+ max_session_duration = 3600 | |
+ name = "sebastian-test-baz" | |
+ path = "/" | |
+ unique_id = (known after apply) | |
+ inline_policy { | |
+ name = (known after apply) | |
+ policy = (known after apply) | |
} | |
} | |
# aws_iam_role_policy_attachment.test["baz"] will be created | |
+ resource "aws_iam_role_policy_attachment" "test" { | |
+ id = (known after apply) | |
+ policy_arn = (known after apply) | |
+ role = "sebastian-test-baz" | |
} | |
Plan: 4 to add, 2 to change, 0 to destroy. | |
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── | |
Saved the plan to: plan |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment