Created
April 15, 2021 09:48
-
-
Save sblask/ac921d4ee4fdc7e7dd21e382c16ce2cc to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
~/Clones/sandpit $ TF_LOG=TRACE terraform_0_15_0 plan -out plan | |
2021-04-15T21:45:35.458+1200 [DEBUG] Adding temp file log sink: /var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/terraform-log231794640 | |
2021-04-15T21:45:35.458+1200 [INFO] Terraform version: 0.15.0 | |
2021-04-15T21:45:35.458+1200 [INFO] Go runtime version: go1.16.2 | |
2021-04-15T21:45:35.458+1200 [INFO] CLI args: []string{"/Users/sebastian/.bin/terraform_0_15_0", "plan", "-out", "plan"} | |
2021-04-15T21:45:35.458+1200 [TRACE] Stdout is a terminal of width 275 | |
2021-04-15T21:45:35.458+1200 [TRACE] Stderr is a terminal of width 275 | |
2021-04-15T21:45:35.458+1200 [TRACE] Stdin is a terminal | |
2021-04-15T21:45:35.458+1200 [DEBUG] Attempting to open CLI config file: /Users/sebastian/.terraformrc | |
2021-04-15T21:45:35.458+1200 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2021-04-15T21:45:35.458+1200 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2021-04-15T21:45:35.459+1200 [DEBUG] ignoring non-existing provider search directory /Users/sebastian/.terraform.d/plugins | |
2021-04-15T21:45:35.459+1200 [DEBUG] ignoring non-existing provider search directory /Users/sebastian/Library/Application Support/io.terraform/plugins | |
2021-04-15T21:45:35.459+1200 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins | |
2021-04-15T21:45:35.459+1200 [INFO] CLI command args: []string{"plan", "-out", "plan"} | |
2021-04-15T21:45:35.460+1200 [TRACE] Meta.Backend: no config given or present on disk, so returning nil config | |
2021-04-15T21:45:35.460+1200 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory | |
2021-04-15T21:45:35.460+1200 [DEBUG] New state was assigned lineage "0c2b6bdf-dc24-55ce-3806-62c5d9a28a72" | |
2021-04-15T21:45:35.460+1200 [TRACE] Meta.Backend: using default local state only (no backend configuration, and no existing initialized backend) | |
2021-04-15T21:45:35.460+1200 [TRACE] Meta.Backend: instantiated backend of type <nil> | |
2021-04-15T21:45:35.460+1200 [TRACE] providercache.fillMetaCache: scanning directory .terraform/providers | |
2021-04-15T21:45:35.461+1200 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/aws v3.36.0 for darwin_amd64 at .terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64 | |
2021-04-15T21:45:35.461+1200 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/cloudinit v2.2.0 for darwin_amd64 at .terraform/providers/registry.terraform.io/hashicorp/cloudinit/2.2.0/darwin_amd64 | |
2021-04-15T21:45:35.461+1200 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/cloudinit/2.2.0/darwin_amd64 as a candidate package for registry.terraform.io/hashicorp/cloudinit 2.2.0 | |
2021-04-15T21:45:35.461+1200 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64 as a candidate package for registry.terraform.io/hashicorp/aws 3.36.0 | |
2021-04-15T21:45:35.925+1200 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers | |
2021-04-15T21:45:35.958+1200 [DEBUG] checking for provisioner in "." | |
2021-04-15T21:45:35.958+1200 [DEBUG] checking for provisioner in "/Users/sebastian/.bin" | |
2021-04-15T21:45:35.958+1200 [INFO] Failed to read plugin lock file .terraform/plugins/darwin_amd64/lock.json: open .terraform/plugins/darwin_amd64/lock.json: no such file or directory | |
2021-04-15T21:45:35.958+1200 [TRACE] Meta.Backend: backend <nil> does not support operations, so wrapping it in a local backend | |
2021-04-15T21:45:35.959+1200 [INFO] backend/local: starting Plan operation | |
2021-04-15T21:45:35.959+1200 [TRACE] backend/local: requesting state manager for workspace "default" | |
2021-04-15T21:45:35.959+1200 [TRACE] backend/local: state manager for workspace "default" will: | |
- read initial snapshot from terraform.tfstate | |
- write new snapshots to terraform.tfstate | |
- create any backup at terraform.tfstate.backup | |
2021-04-15T21:45:35.959+1200 [TRACE] backend/local: requesting state lock for workspace "default" | |
2021-04-15T21:45:35.959+1200 [TRACE] statemgr.Filesystem: preparing to manage state snapshots at terraform.tfstate | |
2021-04-15T21:45:35.960+1200 [TRACE] statemgr.Filesystem: existing snapshot has lineage "8b54bc5f-b11d-4cb1-dd88-042a950fb989" serial 5 | |
2021-04-15T21:45:35.960+1200 [TRACE] statemgr.Filesystem: locking terraform.tfstate using fcntl flock | |
2021-04-15T21:45:35.960+1200 [TRACE] statemgr.Filesystem: writing lock metadata to .terraform.tfstate.lock.info | |
2021-04-15T21:45:35.960+1200 [TRACE] backend/local: reading remote state for workspace "default" | |
2021-04-15T21:45:35.960+1200 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate | |
2021-04-15T21:45:35.960+1200 [TRACE] statemgr.Filesystem: read snapshot with lineage "8b54bc5f-b11d-4cb1-dd88-042a950fb989" serial 5 | |
2021-04-15T21:45:35.960+1200 [TRACE] backend/local: retrieving local state snapshot for workspace "default" | |
2021-04-15T21:45:35.960+1200 [TRACE] backend/local: building context for current working directory | |
2021-04-15T21:45:35.961+1200 [TRACE] terraform.NewContext: starting | |
2021-04-15T21:45:35.961+1200 [TRACE] terraform.NewContext: loading provider schemas | |
2021-04-15T21:45:35.961+1200 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/aws" | |
2021-04-15T21:45:35.961+1200 [DEBUG] created provider logger: level=trace | |
2021-04-15T21:45:35.961+1200 [INFO] provider: configuring client automatic mTLS | |
2021-04-15T21:45:35.992+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5] | |
2021-04-15T21:45:35.999+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=66295 | |
2021-04-15T21:45:36.000+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 | |
2021-04-15T21:45:36.043+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T21:45:36.043+1200 | |
2021-04-15T21:45:36.081+1200 [DEBUG] provider: using plugin: version=5 | |
2021-04-15T21:45:36.081+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin381948882 network=unix timestamp=2021-04-15T21:45:36.081+1200 | |
2021-04-15T21:45:36.124+1200 [TRACE] GRPCProvider: GetProviderSchema | |
2021-04-15T21:45:36.124+1200 [TRACE] provider.stdio: waiting for stdio data | |
2021-04-15T21:45:36.192+1200 [TRACE] GRPCProvider: Close | |
2021-04-15T21:45:36.193+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-04-15T21:45:36.196+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=66295 | |
2021-04-15T21:45:36.196+1200 [DEBUG] provider: plugin exited | |
2021-04-15T21:45:36.196+1200 [TRACE] terraform.NewContext: complete | |
2021-04-15T21:45:36.196+1200 [TRACE] backend/local: finished building terraform.Context | |
2021-04-15T21:45:36.196+1200 [TRACE] backend/local: requesting interactive input, if necessary | |
2021-04-15T21:45:36.196+1200 [TRACE] Context.Input: Prompting for provider arguments | |
2021-04-15T21:45:36.196+1200 [TRACE] Context.Input: Provider provider.aws declared at main.tf:3,1-15 | |
2021-04-15T21:45:36.196+1200 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{} | |
2021-04-15T21:45:36.196+1200 [TRACE] backend/local: running validation operation | |
2021-04-15T21:45:36.196+1200 [INFO] terraform: building graph: GraphTypeValidate | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] ConfigTransformer: Starting for path: | |
2021-04-15T21:45:36.196+1200 [TRACE] ConfigTransformer: Starting for path: module.xyz | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
------ | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes) | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] StateTransformer: state is empty, so nothing to do | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021-04-15T21:45:36.196+1200 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021-04-15T21:45:36.196+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.instance_role" (*terraform.NodeValidatableResource) config from main.tf:35,1-40 | |
2021-04-15T21:45:36.196+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.instance_role | |
2021-04-15T21:45:36.196+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_instance_profile.instance_profile" (*terraform.NodeValidatableResource) config from main.tf:41,1-55 | |
2021-04-15T21:45:36.196+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_instance_profile.instance_profile | |
2021-04-15T21:45:36.196+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.assume_role" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:23, Column:1, Byte:248}, End:hcl.Pos{Line:23, Column:45, Byte:292}} | |
2021-04-15T21:45:36.196+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.assume_role | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachResourceConfigTransformer: attaching to "module.xyz.aws_security_group.efs_access" (*terraform.NodeValidatableResource) config from module/main.tf:9,1-43 | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.xyz.aws_security_group.efs_access | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachResourceConfigTransformer: attaching to "module.xyz.data.aws_vpc.test" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"module/main.tf", Start:hcl.Pos{Line:3, Column:1, Byte:19}, End:hcl.Pos{Line:3, Column:22, Byte:40}} | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.xyz.data.aws_vpc.test | |
2021-04-15T21:45:36.197+1200 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021-04-15T21:45:36.197+1200 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021-04-15T21:45:36.197+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021-04-15T21:45:36.197+1200 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from main.tf:3,1-15 | |
2021-04-15T21:45:36.197+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz.provider["registry.terraform.io/hashicorp/aws"] (proxy) - *terraform.graphNodeProxyProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.197+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021-04-15T21:45:36.197+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021-04-15T21:45:36.197+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021-04-15T21:45:36.197+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.instance_role | |
2021-04-15T21:45:36.197+1200 [DEBUG] ProviderTransformer: "aws_iam_role.instance_role" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.197+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_instance_profile.instance_profile | |
2021-04-15T21:45:36.197+1200 [DEBUG] ProviderTransformer: "aws_iam_instance_profile.instance_profile" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.197+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.assume_role | |
2021-04-15T21:45:36.197+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.assume_role" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.197+1200 [TRACE] ProviderTransformer: exact match for module.xyz.provider["registry.terraform.io/hashicorp/aws"] serving module.xyz.aws_security_group.efs_access | |
2021-04-15T21:45:36.197+1200 [DEBUG] ProviderTransformer: "module.xyz.aws_security_group.efs_access" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.197+1200 [TRACE] ProviderTransformer: exact match for module.xyz.provider["registry.terraform.io/hashicorp/aws"] serving module.xyz.data.aws_vpc.test | |
2021-04-15T21:45:36.197+1200 [DEBUG] ProviderTransformer: "module.xyz.data.aws_vpc.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.197+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.197+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021-04-15T21:45:36.197+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021-04-15T21:45:36.197+1200 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.197+1200 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021-04-15T21:45:36.197+1200 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021-04-15T21:45:36.197+1200 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.assume_role | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to module.xyz.aws_security_group.efs_access | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to module.xyz.data.aws_vpc.test | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.instance_role | |
2021-04-15T21:45:36.197+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_instance_profile.instance_profile | |
2021-04-15T21:45:36.197+1200 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021-04-15T21:45:36.197+1200 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021-04-15T21:45:36.197+1200 [TRACE] ModuleExpansionTransformer: Added module.xyz as *terraform.nodeValidateModule | |
2021-04-15T21:45:36.197+1200 [TRACE] ModuleExpansionTransformer: module.xyz.aws_security_group.efs_access must wait for expansion of module.xyz | |
2021-04-15T21:45:36.197+1200 [TRACE] ModuleExpansionTransformer: module.xyz.data.aws_vpc.test must wait for expansion of module.xyz | |
2021-04-15T21:45:36.197+1200 [TRACE] ModuleExpansionTransformer: module.xyz (close) must wait for expansion of module.xyz | |
2021-04-15T21:45:36.197+1200 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.197+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T21:45:36.197+1200 [DEBUG] ReferenceTransformer: "module.xyz.aws_security_group.efs_access" references: [module.xyz.data.aws_vpc.test] | |
2021-04-15T21:45:36.197+1200 [DEBUG] ReferenceTransformer: "module.xyz.data.aws_vpc.test" references: [] | |
2021-04-15T21:45:36.197+1200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021-04-15T21:45:36.197+1200 [DEBUG] ReferenceTransformer: "module.xyz (expand)" references: [aws_iam_role.instance_role] | |
2021-04-15T21:45:36.197+1200 [DEBUG] ReferenceTransformer: "module.xyz (close)" references: [] | |
2021-04-15T21:45:36.198+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance_role" references: [data.aws_iam_policy_document.assume_role] | |
2021-04-15T21:45:36.198+1200 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.instance_profile" references: [aws_iam_role.instance_role] | |
2021-04-15T21:45:36.198+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.198+1200 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021-04-15T21:45:36.198+1200 [TRACE] Executing graph transform *terraform.attachDataResourceDependsOnTransformer | |
2021-04-15T21:45:36.198+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.assume_role depends on [] | |
2021-04-15T21:45:36.198+1200 [TRACE] attachDataDependenciesTransformer: module.xyz.data.aws_vpc.test depends on [] | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.attachDataResourceDependsOnTransformer (no changes) | |
2021-04-15T21:45:36.198+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T21:45:36.198+1200 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021-04-15T21:45:36.198+1200 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.198+1200 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.198+1200 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021-04-15T21:45:36.198+1200 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021-04-15T21:45:36.198+1200 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
data.aws_iam_policy_document.assume_role - *terraform.NodeValidatableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
aws_iam_role.instance_role - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz.data.aws_vpc.test - *terraform.NodeValidatableResource | |
module.xyz (expand) - *terraform.nodeValidateModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.instance_profile - *terraform.NodeValidatableResource | |
module.xyz.aws_security_group.efs_access - *terraform.NodeValidatableResource | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021-04-15T21:45:36.198+1200 [DEBUG] Starting graph walk: walkValidate | |
2021-04-15T21:45:36.199+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-04-15T21:45:36.199+1200 [DEBUG] created provider logger: level=trace | |
2021-04-15T21:45:36.199+1200 [INFO] provider: configuring client automatic mTLS | |
2021-04-15T21:45:36.231+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5] | |
2021-04-15T21:45:36.238+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=66296 | |
2021-04-15T21:45:36.238+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 | |
2021-04-15T21:45:36.281+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T21:45:36.281+1200 | |
2021-04-15T21:45:36.315+1200 [DEBUG] provider: using plugin: version=5 | |
2021-04-15T21:45:36.315+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin069182623 network=unix timestamp=2021-04-15T21:45:36.315+1200 | |
2021-04-15T21:45:36.355+1200 [TRACE] provider.stdio: waiting for stdio data | |
2021-04-15T21:45:36.355+1200 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.355+1200 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021-04-15T21:45:36.355+1200 [TRACE] GRPCProvider: GetProviderSchema | |
2021-04-15T21:45:36.426+1200 [TRACE] GRPCProvider: ValidateProviderConfig | |
2021-04-15T21:45:36.498+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021-04-15T21:45:36.498+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T21:45:36.499+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig | |
2021-04-15T21:45:36.499+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:36 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T21:45:36.499+1200 | |
2021-04-15T21:45:36.499+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:36 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T21:45:36.499+1200 | |
2021-04-15T21:45:36.499+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:36 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T21:45:36.499+1200 | |
2021-04-15T21:45:36.499+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": visit complete | |
2021-04-15T21:45:36.500+1200 [TRACE] vertex "aws_iam_role.instance_role": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T21:45:36.500+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T21:45:36.500+1200 [TRACE] vertex "aws_iam_role.instance_role": visit complete | |
2021-04-15T21:45:36.500+1200 [TRACE] vertex "module.xyz (expand)": starting visit (*terraform.nodeValidateModule) | |
2021-04-15T21:45:36.500+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T21:45:36.501+1200 [TRACE] vertex "module.xyz (expand)": visit complete | |
2021-04-15T21:45:36.501+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T21:45:36.501+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T21:45:36.501+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig | |
2021-04-15T21:45:36.501+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": visit complete | |
2021-04-15T21:45:36.501+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": visit complete | |
2021-04-15T21:45:36.501+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": starting visit (*terraform.NodeValidatableResource) | |
2021-04-15T21:45:36.501+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T21:45:36.502+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": visit complete | |
2021-04-15T21:45:36.502+1200 [TRACE] vertex "module.xyz (close)": starting visit (*terraform.nodeCloseModule) | |
2021-04-15T21:45:36.502+1200 [TRACE] vertex "module.xyz (close)": visit complete | |
2021-04-15T21:45:36.502+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021-04-15T21:45:36.502+1200 [TRACE] GRPCProvider: Close | |
2021-04-15T21:45:36.502+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021-04-15T21:45:36.502+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-04-15T21:45:36.503+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-04-15T21:45:36.506+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=66296 | |
2021-04-15T21:45:36.506+1200 [DEBUG] provider: plugin exited | |
2021-04-15T21:45:36.506+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021-04-15T21:45:36.506+1200 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021-04-15T21:45:36.506+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T21:45:36.506+1200 [INFO] backend/local: plan calling Plan | |
2021-04-15T21:45:36.506+1200 [INFO] terraform: building graph: GraphTypePlan | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.ConfigTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] ConfigTransformer: Starting for path: | |
2021-04-15T21:45:36.506+1200 [TRACE] ConfigTransformer: Starting for path: module.xyz | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
------ | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.RootVariableTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes) | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes) | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.LocalTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.LocalTransformer (no changes) | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.OutputTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes) | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes) | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.StateTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] StateTransformer: creating nodes for deposed instance objects only | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.StateTransformer (no changes) | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes) | |
2021-04-15T21:45:36.506+1200 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer | |
2021-04-15T21:45:36.506+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.instance_role (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:35,1-40 | |
2021-04-15T21:45:36.506+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.instance_role (expand) | |
2021-04-15T21:45:36.506+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_instance_profile.instance_profile (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:41,1-55 | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_instance_profile.instance_profile (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.assume_role (expand)" (*terraform.nodeExpandPlannableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:23, Column:1, Byte:248}, End:hcl.Pos{Line:23, Column:45, Byte:292}} | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.assume_role (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachResourceConfigTransformer: attaching to "module.xyz.aws_security_group.efs_access (expand)" (*terraform.nodeExpandPlannableResource) config from module/main.tf:9,1-43 | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.xyz.aws_security_group.efs_access (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachResourceConfigTransformer: attaching to "module.xyz.data.aws_vpc.test (expand)" (*terraform.nodeExpandPlannableResource) config from hcl.Range{Filename:"module/main.tf", Start:hcl.Pos{Line:3, Column:1, Byte:19}, End:hcl.Pos{Line:3, Column:22, Byte:40}} | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to module.xyz.data.aws_vpc.test (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes) | |
2021-04-15T21:45:36.507+1200 [TRACE] Executing graph transform *terraform.graphTransformerMulti | |
2021-04-15T21:45:36.507+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer | |
2021-04-15T21:45:36.507+1200 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from main.tf:3,1-15 | |
2021-04-15T21:45:36.507+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.provider["registry.terraform.io/hashicorp/aws"] (proxy) - *terraform.graphNodeProxyProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.507+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer | |
2021-04-15T21:45:36.507+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes) | |
2021-04-15T21:45:36.507+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer | |
2021-04-15T21:45:36.507+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.instance_role (expand) | |
2021-04-15T21:45:36.507+1200 [DEBUG] ProviderTransformer: "aws_iam_role.instance_role (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.507+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_instance_profile.instance_profile (expand) | |
2021-04-15T21:45:36.507+1200 [DEBUG] ProviderTransformer: "aws_iam_instance_profile.instance_profile (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.507+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.assume_role (expand) | |
2021-04-15T21:45:36.507+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.assume_role (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.507+1200 [TRACE] ProviderTransformer: exact match for module.xyz.provider["registry.terraform.io/hashicorp/aws"] serving module.xyz.aws_security_group.efs_access (expand) | |
2021-04-15T21:45:36.507+1200 [DEBUG] ProviderTransformer: "module.xyz.aws_security_group.efs_access (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.507+1200 [TRACE] ProviderTransformer: exact match for module.xyz.provider["registry.terraform.io/hashicorp/aws"] serving module.xyz.data.aws_vpc.test (expand) | |
2021-04-15T21:45:36.507+1200 [DEBUG] ProviderTransformer: "module.xyz.data.aws_vpc.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.507+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.507+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer | |
2021-04-15T21:45:36.507+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes) | |
2021-04-15T21:45:36.507+1200 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.507+1200 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer | |
2021-04-15T21:45:36.507+1200 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes) | |
2021-04-15T21:45:36.507+1200 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.instance_role (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_instance_profile.instance_profile (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.assume_role (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to module.xyz.aws_security_group.efs_access (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to module.xyz.data.aws_vpc.test (expand) | |
2021-04-15T21:45:36.507+1200 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.507+1200 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes) | |
2021-04-15T21:45:36.507+1200 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer | |
2021-04-15T21:45:36.507+1200 [TRACE] ModuleExpansionTransformer: Added module.xyz as *terraform.nodeExpandModule | |
2021-04-15T21:45:36.507+1200 [TRACE] ModuleExpansionTransformer: module.xyz (close) must wait for expansion of module.xyz | |
2021-04-15T21:45:36.507+1200 [TRACE] ModuleExpansionTransformer: module.xyz.aws_security_group.efs_access (expand) must wait for expansion of module.xyz | |
2021-04-15T21:45:36.507+1200 [TRACE] ModuleExpansionTransformer: module.xyz.data.aws_vpc.test (expand) must wait for expansion of module.xyz | |
2021-04-15T21:45:36.507+1200 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.507+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T21:45:36.507+1200 [DEBUG] ReferenceTransformer: "module.xyz (expand)" references: [aws_iam_role.instance_role (expand)] | |
2021-04-15T21:45:36.507+1200 [DEBUG] ReferenceTransformer: "module.xyz (close)" references: [] | |
2021-04-15T21:45:36.507+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance_role (expand)" references: [data.aws_iam_policy_document.assume_role (expand)] | |
2021-04-15T21:45:36.507+1200 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.instance_profile (expand)" references: [aws_iam_role.instance_role (expand)] | |
2021-04-15T21:45:36.507+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role (expand)" references: [] | |
2021-04-15T21:45:36.507+1200 [DEBUG] ReferenceTransformer: "module.xyz.aws_security_group.efs_access (expand)" references: [module.xyz.data.aws_vpc.test (expand)] | |
2021-04-15T21:45:36.507+1200 [DEBUG] ReferenceTransformer: "module.xyz.data.aws_vpc.test (expand)" references: [] | |
2021-04-15T21:45:36.508+1200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: [] | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.508+1200 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer | |
2021-04-15T21:45:36.508+1200 [TRACE] AttachDependenciesTransformer: data.aws_iam_policy_document.assume_role depends on [] | |
2021-04-15T21:45:36.508+1200 [TRACE] AttachDependenciesTransformer: module.xyz.aws_security_group.efs_access depends on [aws_iam_role.instance_role data.aws_iam_policy_document.assume_role module.xyz.data.aws_vpc.test] | |
2021-04-15T21:45:36.508+1200 [TRACE] AttachDependenciesTransformer: module.xyz.data.aws_vpc.test depends on [aws_iam_role.instance_role data.aws_iam_policy_document.assume_role] | |
2021-04-15T21:45:36.508+1200 [TRACE] AttachDependenciesTransformer: aws_iam_role.instance_role depends on [data.aws_iam_policy_document.assume_role] | |
2021-04-15T21:45:36.508+1200 [TRACE] AttachDependenciesTransformer: aws_iam_instance_profile.instance_profile depends on [aws_iam_role.instance_role data.aws_iam_policy_document.assume_role] | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes) | |
2021-04-15T21:45:36.508+1200 [TRACE] Executing graph transform *terraform.attachDataResourceDependsOnTransformer | |
2021-04-15T21:45:36.508+1200 [TRACE] attachDataDependenciesTransformer: module.xyz.data.aws_vpc.test depends on [aws_iam_role.instance_role data.aws_iam_policy_document.assume_role] | |
2021-04-15T21:45:36.508+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.assume_role depends on [] | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.attachDataResourceDependsOnTransformer (no changes) | |
2021-04-15T21:45:36.508+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T21:45:36.508+1200 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer | |
2021-04-15T21:45:36.508+1200 [TRACE] ForcedCBDTransformer: "aws_iam_role.instance_role (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T21:45:36.508+1200 [TRACE] ForcedCBDTransformer: "aws_iam_instance_profile.instance_profile (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T21:45:36.508+1200 [TRACE] ForcedCBDTransformer: "data.aws_iam_policy_document.assume_role (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T21:45:36.508+1200 [TRACE] ForcedCBDTransformer: "module.xyz.aws_security_group.efs_access (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T21:45:36.508+1200 [TRACE] ForcedCBDTransformer: "module.xyz.data.aws_vpc.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes) | |
2021-04-15T21:45:36.508+1200 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.508+1200 [TRACE] Executing graph transform *terraform.CloseProviderTransformer | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
------ | |
2021-04-15T21:45:36.508+1200 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021-04-15T21:45:36.508+1200 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer | |
2021-04-15T21:45:36.508+1200 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph: | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
data.aws_iam_policy_document.assume_role (expand) - *terraform.nodeExpandPlannableResource | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz (close) - *terraform.nodeCloseModule | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
aws_iam_role.instance_role (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.data.aws_vpc.test (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz (expand) - *terraform.nodeExpandModule | |
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
aws_iam_instance_profile.instance_profile (expand) - *terraform.nodeExpandPlannableResource | |
module.xyz.aws_security_group.efs_access (expand) - *terraform.nodeExpandPlannableResource | |
root - *terraform.nodeCloseModule | |
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary | |
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider | |
------ | |
2021-04-15T21:45:36.508+1200 [DEBUG] Starting graph walk: walkPlan | |
2021-04-15T21:45:36.509+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider) | |
2021-04-15T21:45:36.509+1200 [DEBUG] created provider logger: level=trace | |
2021-04-15T21:45:36.509+1200 [INFO] provider: configuring client automatic mTLS | |
2021-04-15T21:45:36.540+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5] | |
2021-04-15T21:45:36.548+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=66297 | |
2021-04-15T21:45:36.548+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 | |
2021-04-15T21:45:36.590+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T21:45:36.590+1200 | |
2021-04-15T21:45:36.626+1200 [DEBUG] provider: using plugin: version=5 | |
2021-04-15T21:45:36.626+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin566196916 network=unix timestamp=2021-04-15T21:45:36.626+1200 | |
2021-04-15T21:45:36.665+1200 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"] | |
2021-04-15T21:45:36.665+1200 [TRACE] provider.stdio: waiting for stdio data | |
2021-04-15T21:45:36.666+1200 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only | |
2021-04-15T21:45:36.666+1200 [TRACE] GRPCProvider: GetProviderSchema | |
2021-04-15T21:45:36.731+1200 [TRACE] GRPCProvider: ValidateProviderConfig | |
2021-04-15T21:45:36.797+1200 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/hashicorp/aws\"]" changed the config value, but that value is unused | |
2021-04-15T21:45:36.797+1200 [TRACE] GRPCProvider: ConfigureProvider | |
2021-04-15T21:45:36.798+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:36 [INFO] assume_role configuration set: (ARN: "arn:aws:iam::XXXXXXXXXXXXXXXX:role/terraform-admin", SessionID: "", ExternalID: ""): timestamp=2021-04-15T21:45:36.798+1200 | |
2021-04-15T21:45:36.798+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:36 [INFO] AWS Auth provider used: "EnvProvider": timestamp=2021-04-15T21:45:36.798+1200 | |
2021-04-15T21:45:36.798+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:36 [INFO] Attempting to AssumeRole arn:aws:iam::XXXXXXXXXXXXXXXX:role/terraform-admin (SessionName: "", ExternalId: ""): timestamp=2021-04-15T21:45:36.798+1200 | |
2021-04-15T21:45:36.798+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:36 [DEBUG] [aws-sdk-go] DEBUG: Request sts/AssumeRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sts.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) | |
Content-Length: 159 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIAS6L2E357XNKKD4WM/20210415/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=d58756f31ad5418ecc6f0c589869df0cb75a375b8b314a926a20b7786de26ae1 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094536Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELH//////////wEaDDhYBKvUmG0Ba28LvyKGATvVQBWhqQFd8ebeXrEsDimzLl5lZIE1UhRrrioV+e6xZ4pI3QEv95mwz81YoZR6UfzzOy/NgNdKA8ur744gPPlEDXhrojqPdOf8qna4FVsWbWnNtMORw2bDpJpu8WkMffk/nHUnjVWDhomtZmNCmRhsQr8n8axEIRLYoaPXoaJaPGGsafiGKJXs3YMGMii9LOq5CCJ7jOKSyfF2nSlL9ohStopd4T9YL3IUCDqF5pLAzz/QJp1r | |
Accept-Encoding: gzip | |
Action=AssumeRole&DurationSeconds=900&RoleArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Arole%2Fterraform-admin&RoleSessionName=1618479936798574000&Version=2011-06-15 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:36.798+1200 | |
2021-04-15T21:45:37.773+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:37 [DEBUG] [aws-sdk-go] DEBUG: Response sts/AssumeRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 1092 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 09:45:36 GMT | |
X-Amzn-Requestid: bbe659cd-220d-4238-9a39-d48446f0b417 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:37.773+1200 | |
2021-04-15T21:45:37.773+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:37 [DEBUG] [aws-sdk-go] <AssumeRoleResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
<AssumeRoleResult> | |
<AssumedRoleUser> | |
<AssumedRoleId>AROARF4HWBBNRYHWWXHE5:1618479936798574000</AssumedRoleId> | |
<Arn>arn:aws:sts::XXXXXXXXXXXXXXXX:assumed-role/terraform-admin/1618479936798574000</Arn> | |
</AssumedRoleUser> | |
<Credentials> | |
<AccessKeyId>ASIARF4HWBBNW2DHGIPW</AccessKeyId> | |
<SecretAccessKey>ty4GK59WDEoJ0eBQABPFFwLqkOqnnfPnpPx0vGj0</SecretAccessKey> | |
<SessionToken>FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q==</SessionToken> | |
<Expiration>2021-04-15T10:00:37Z</Expiration> | |
</Credentials> | |
</AssumeRoleResult> | |
<ResponseMetadata> | |
<RequestId>bbe659cd-220d-4238-9a39-d48446f0b417</RequestId> | |
</ResponseMetadata> | |
</AssumeRoleResponse>: timestamp=2021-04-15T21:45:37.773+1200 | |
2021-04-15T21:45:37.774+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:37 [DEBUG] Trying to get account information via sts:GetCallerIdentity: timestamp=2021-04-15T21:45:37.774+1200 | |
2021-04-15T21:45:37.775+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:37 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: sts.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 43 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNW2DHGIPW/20210415/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=ef3fb85d4d8f6ecaafbf48899a3da4c44d92c81ef1fac744b04d69596cddcd77 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094537Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q== | |
Accept-Encoding: gzip | |
Action=GetCallerIdentity&Version=2011-06-15 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:37.775+1200 | |
2021-04-15T21:45:38.653+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 460 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 09:45:37 GMT | |
X-Amzn-Requestid: fbded0f0-2c0f-4547-8018-44d43621b022 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:38.653+1200 | |
2021-04-15T21:45:38.653+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
<GetCallerIdentityResult> | |
<Arn>arn:aws:sts::XXXXXXXXXXXXXXXX:assumed-role/terraform-admin/1618479936798574000</Arn> | |
<UserId>AROARF4HWBBNRYHWWXHE5:1618479936798574000</UserId> | |
<Account>XXXXXXXXXXXXXXXX</Account> | |
</GetCallerIdentityResult> | |
<ResponseMetadata> | |
<RequestId>fbded0f0-2c0f-4547-8018-44d43621b022</RequestId> | |
</ResponseMetadata> | |
</GetCallerIdentityResponse>: timestamp=2021-04-15T21:45:38.653+1200 | |
2021-04-15T21:45:38.659+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: ec2.ap-southeast-2.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 87 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNW2DHGIPW/20210415/ap-southeast-2/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=42849078b87fca5133e25aa4f7fd1ee288e6e342a9dd01fcf378604f914a51fd | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094538Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q== | |
Accept-Encoding: gzip | |
Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:38.659+1200 | |
2021-04-15T21:45:38.918+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 540 | |
Cache-Control: no-cache, no-store | |
Content-Type: text/xml;charset=UTF-8 | |
Date: Thu, 15 Apr 2021 09:45:38 GMT | |
Server: AmazonEC2 | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
X-Amzn-Requestid: cf73a351-2867-4eba-964a-aec4843ed7e2 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:38.917+1200 | |
2021-04-15T21:45:38.918+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
<DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
<requestId>cf73a351-2867-4eba-964a-aec4843ed7e2</requestId> | |
<accountAttributeSet> | |
<item> | |
<attributeName>supported-platforms</attributeName> | |
<attributeValueSet> | |
<item> | |
<attributeValue>VPC</attributeValue> | |
</item> | |
</attributeValueSet> | |
</item> | |
</accountAttributeSet> | |
</DescribeAccountAttributesResponse>: timestamp=2021-04-15T21:45:38.917+1200 | |
2021-04-15T21:45:38.918+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete | |
2021-04-15T21:45:38.918+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T21:45:38.918+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role (expand)": expanding dynamic subgraph | |
2021-04-15T21:45:38.918+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role (expand)": entering dynamic subgraph | |
2021-04-15T21:45:38.918+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T21:45:38.918+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": expanding dynamic subgraph | |
2021-04-15T21:45:38.918+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T21:45:38.918+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.assume_role as *terraform.NodePlannableResourceInstance | |
2021-04-15T21:45:38.918+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
data.aws_iam_policy_document.assume_role - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T21:45:38.918+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T21:45:38.918+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T21:45:38.918+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T21:45:38.919+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T21:45:38.919+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T21:45:38.919+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T21:45:38.919+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T21:45:38.919+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_role" references: [] | |
2021-04-15T21:45:38.919+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T21:45:38.919+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T21:45:38.919+1200 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021-04-15T21:45:38.919+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": entering dynamic subgraph | |
2021-04-15T21:45:38.919+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T21:45:38.919+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.assume_role | |
2021-04-15T21:45:38.920+1200 [TRACE] readDataSource: Re-validating config for data.aws_iam_policy_document.assume_role | |
2021-04-15T21:45:38.920+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig | |
2021-04-15T21:45:38.921+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T21:45:38.921+1200 | |
2021-04-15T21:45:38.921+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T21:45:38.921+1200 | |
2021-04-15T21:45:38.921+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T21:45:38.921+1200 | |
2021-04-15T21:45:38.921+1200 [TRACE] readDataSource: data.aws_iam_policy_document.assume_role configuration is complete, so reading from provider | |
2021-04-15T21:45:38.921+1200 [TRACE] GRPCProvider: ReadDataSource | |
2021-04-15T21:45:38.923+1200 [WARN] Provider "provider[\"registry.terraform.io/hashicorp/aws\"]" produced an unexpected new value for data.aws_iam_policy_document.assume_role. | |
- .id: was cty.StringVal("670167585"), but now cty.StringVal("1903849331") | |
- .json: was cty.StringVal("{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::202656505727:root\"\n },\n \"Condition\": {\n \"Bool\": {\n \"aws:MultiFactorAuthPresent\": [\n \"true\"\n ]\n }\n }\n },\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}"), but now cty.StringVal("{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n }\n }\n ]\n}") | |
- .version: was null, but now cty.StringVal("2012-10-17") | |
- .statement[0].sid: was null, but now cty.StringVal("") | |
- .statement[0].effect: was null, but now cty.StringVal("Allow") | |
- .statement[0].not_actions: was null, but now cty.SetValEmpty(cty.String) | |
- .statement[0].not_resources: was null, but now cty.SetValEmpty(cty.String) | |
- .statement[0].resources: was null, but now cty.SetValEmpty(cty.String) | |
2021-04-15T21:45:38.923+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.assume_role | |
2021-04-15T21:45:38.923+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.assume_role | |
2021-04-15T21:45:38.923+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.assume_role | |
2021-04-15T21:45:38.923+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": visit complete | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": dynamic subgraph completed successfully | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role": visit complete | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role (expand)": dynamic subgraph completed successfully | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_role (expand)": visit complete | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "aws_iam_role.instance_role (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "aws_iam_role.instance_role (expand)": expanding dynamic subgraph | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "aws_iam_role.instance_role (expand)": entering dynamic subgraph | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "aws_iam_role.instance_role": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "aws_iam_role.instance_role": expanding dynamic subgraph | |
2021-04-15T21:45:38.924+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T21:45:38.924+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.instance_role as *terraform.NodePlannableResourceInstance | |
2021-04-15T21:45:38.924+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_role.instance_role - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T21:45:38.924+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T21:45:38.924+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T21:45:38.924+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T21:45:38.924+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T21:45:38.924+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T21:45:38.924+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T21:45:38.924+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T21:45:38.924+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance_role" references: [] | |
2021-04-15T21:45:38.924+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T21:45:38.924+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T21:45:38.924+1200 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "aws_iam_role.instance_role": entering dynamic subgraph | |
2021-04-15T21:45:38.924+1200 [TRACE] vertex "aws_iam_role.instance_role": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T21:45:38.924+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.instance_role | |
2021-04-15T21:45:38.924+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.instance_role is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T21:45:38.924+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
aws_iam_role.instance_role: Refreshing state... [id=instance] | |
2021-04-15T21:45:38.925+1200 [TRACE] GRPCProvider: ReadResource | |
2021-04-15T21:45:38.926+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T21:45:38.926+1200 | |
2021-04-15T21:45:38.926+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:38 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 51 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNW2DHGIPW/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=c20447ea5988327b280a7fbb0cee81091a3bb3d6dcb2e0a2d9e3f21181264c58 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094538Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q== | |
Accept-Encoding: gzip | |
Action=GetRole&RoleName=instance&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:38.926+1200 | |
2021-04-15T21:45:39.934+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:39 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 1158 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 09:45:39 GMT | |
X-Amzn-Requestid: 6f2296a9-e6ac-4a80-8845-572f0983a879 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:39.933+1200 | |
2021-04-15T21:45:39.934+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:39 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetRoleResult> | |
<Role> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%YYYYYYYYYYYYYYYYYYYY/%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%2C%22Condition%22%3A%7B%22Bool%22%3A%7B%22aws%3AMultiFactorAuthPresent%22%3A%22true%22%7D%7D%7D%2C%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22ec2.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<MaxSessionDuration>3600</MaxSessionDuration> | |
<RoleId>AROARF4HWBBNZMHKLRBIH</RoleId> | |
<RoleLastUsed/> | |
<RoleName>instance</RoleName> | |
<Description>A role for r-cloud instance</Description> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXX:role/instance</Arn> | |
<CreateDate>2021-04-15T09:36:47Z</CreateDate> | |
</Role> | |
</GetRoleResult> | |
<ResponseMetadata> | |
<RequestId>6f2296a9-e6ac-4a80-8845-572f0983a879</RequestId> | |
</ResponseMetadata> | |
</GetRoleResponse>: timestamp=2021-04-15T21:45:39.934+1200 | |
2021-04-15T21:45:39.934+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:39 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 60 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNW2DHGIPW/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=6695ead0694f5de09ffb917f7fb8cd088f9c0f63856c6825d7df75f87b445be6 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094539Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q== | |
Accept-Encoding: gzip | |
Action=ListRolePolicies&RoleName=instance&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:39.934+1200 | |
2021-04-15T21:45:41.111+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:41 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 323 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 09:45:40 GMT | |
X-Amzn-Requestid: ee8950a6-6dee-4b7f-9030-2b5363a3be89 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:41.111+1200 | |
2021-04-15T21:45:41.111+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:41 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<PolicyNames/> | |
</ListRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>ee8950a6-6dee-4b7f-9030-2b5363a3be89</RequestId> | |
</ResponseMetadata> | |
</ListRolePoliciesResponse>: timestamp=2021-04-15T21:45:41.111+1200 | |
2021-04-15T21:45:41.112+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:41 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 68 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNW2DHGIPW/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=aa1a771036d2ec6d268b9e85cd74fd20b64f037d3741c34ea4aefc4a1f914bf8 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094541Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q== | |
Accept-Encoding: gzip | |
Action=ListAttachedRolePolicies&RoleName=instance&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:41.111+1200 | |
2021-04-15T21:45:41.509+1200 [TRACE] dag/walk: vertex "module.xyz (expand)" is waiting for "aws_iam_role.instance_role (expand)" | |
2021-04-15T21:45:41.509+1200 [TRACE] dag/walk: vertex "module.xyz (close)" is waiting for "module.xyz.aws_security_group.efs_access (expand)" | |
2021-04-15T21:45:41.509+1200 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "module.xyz.aws_security_group.efs_access (expand)" | |
2021-04-15T21:45:41.510+1200 [TRACE] dag/walk: vertex "aws_iam_instance_profile.instance_profile (expand)" is waiting for "aws_iam_role.instance_role (expand)" | |
2021-04-15T21:45:41.510+1200 [TRACE] dag/walk: vertex "root" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" | |
2021-04-15T21:45:41.510+1200 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "aws_iam_instance_profile.instance_profile (expand)" | |
2021-04-15T21:45:41.510+1200 [TRACE] dag/walk: vertex "module.xyz.data.aws_vpc.test (expand)" is waiting for "module.xyz (expand)" | |
2021-04-15T21:45:41.510+1200 [TRACE] dag/walk: vertex "module.xyz.aws_security_group.efs_access (expand)" is waiting for "module.xyz.data.aws_vpc.test (expand)" | |
2021-04-15T21:45:42.186+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:42 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 360 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 09:45:41 GMT | |
X-Amzn-Requestid: a0a22656-685f-40e3-b05b-8e1f41054412 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:42.186+1200 | |
2021-04-15T21:45:42.186+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:42 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<ListAttachedRolePoliciesResult> | |
<IsTruncated>false</IsTruncated> | |
<AttachedPolicies/> | |
</ListAttachedRolePoliciesResult> | |
<ResponseMetadata> | |
<RequestId>a0a22656-685f-40e3-b05b-8e1f41054412</RequestId> | |
</ResponseMetadata> | |
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T21:45:42.186+1200 | |
2021-04-15T21:45:42.187+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.instance_role | |
2021-04-15T21:45:42.187+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance_role | |
2021-04-15T21:45:42.188+1200 [TRACE] Re-validating config for "aws_iam_role.instance_role" | |
2021-04-15T21:45:42.188+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T21:45:42.189+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T21:45:42.191+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.instance_role, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
- .force_detach_policies: planned value cty.False for a non-computed attribute | |
2021-04-15T21:45:42.191+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance_role | |
2021-04-15T21:45:42.191+1200 [TRACE] writeChange: recorded Update change for aws_iam_role.instance_role | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_role.instance_role": visit complete | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_role.instance_role": dynamic subgraph completed successfully | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_role.instance_role": visit complete | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_role.instance_role (expand)": dynamic subgraph completed successfully | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_role.instance_role (expand)": visit complete | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "module.xyz (expand)": starting visit (*terraform.nodeExpandModule) | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "module.xyz (expand)": visit complete | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile (expand)": expanding dynamic subgraph | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test (expand)": expanding dynamic subgraph | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile (expand)": entering dynamic subgraph | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test (expand)": entering dynamic subgraph | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T21:45:42.191+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T21:45:42.192+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": expanding dynamic subgraph | |
2021-04-15T21:45:42.192+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": expanding dynamic subgraph | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] ResourceCountTransformer: adding module.xyz.data.aws_vpc.test as *terraform.NodePlannableResourceInstance | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
module.xyz.data.aws_vpc.test - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T21:45:42.192+1200 [DEBUG] ReferenceTransformer: "module.xyz.data.aws_vpc.test" references: [] | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": entering dynamic subgraph | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] ResourceCountTransformer: adding aws_iam_instance_profile.instance_profile as *terraform.NodePlannableResourceInstance | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
aws_iam_instance_profile.instance_profile - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T21:45:42.192+1200 [TRACE] readResourceInstanceState: reading state for module.xyz.data.aws_vpc.test | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T21:45:42.192+1200 [DEBUG] ReferenceTransformer: "aws_iam_instance_profile.instance_profile" references: [] | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T21:45:42.192+1200 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021-04-15T21:45:42.192+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": entering dynamic subgraph | |
2021-04-15T21:45:42.192+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T21:45:42.192+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_instance_profile.instance_profile | |
2021-04-15T21:45:42.193+1200 [TRACE] upgradeResourceState: schema version of aws_iam_instance_profile.instance_profile is still 0; calling provider "aws" for any other minor fixups | |
2021-04-15T21:45:42.193+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
2021-04-15T21:45:42.193+1200 [TRACE] planDataSource: module.xyz.data.aws_vpc.test configuration is fully known, but we're forcing a read plan to be created | |
2021-04-15T21:45:42.193+1200 [TRACE] writeResourceInstanceState: using RefreshState for module.xyz.data.aws_vpc.test | |
2021-04-15T21:45:42.193+1200 [TRACE] writeResourceInstanceState: writing current state object for module.xyz.data.aws_vpc.test | |
aws_iam_instance_profile.instance_profile: Refreshing state... [id=instance] | |
2021-04-15T21:45:42.193+1200 [TRACE] GRPCProvider: ReadResource | |
2021-04-15T21:45:42.193+1200 [TRACE] writeResourceInstanceState: writing current state object for module.xyz.data.aws_vpc.test | |
2021-04-15T21:45:42.193+1200 [TRACE] writeChange: recorded Read change for module.xyz.data.aws_vpc.test | |
2021-04-15T21:45:42.193+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": visit complete | |
2021-04-15T21:45:42.193+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": dynamic subgraph completed successfully | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test": visit complete | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test (expand)": dynamic subgraph completed successfully | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.data.aws_vpc.test (expand)": visit complete | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access (expand)": starting visit (*terraform.nodeExpandPlannableResource) | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access (expand)": expanding dynamic subgraph | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access (expand)": entering dynamic subgraph | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": starting visit (*terraform.NodePlannableResource) | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": expanding dynamic subgraph | |
2021-04-15T21:45:42.194+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:42 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetInstanceProfile Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 73 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNW2DHGIPW/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=b9af06d1f0f74f2997b4e9450e04078ff6af63ce3fd4a7b6846be67f9a04e947 | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094542Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q== | |
Accept-Encoding: gzip | |
Action=GetInstanceProfile&InstanceProfileName=instance&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:42.194+1200 | |
2021-04-15T21:45:42.194+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer | |
2021-04-15T21:45:42.194+1200 [TRACE] ResourceCountTransformer: adding module.xyz.aws_security_group.efs_access as *terraform.NodePlannableResourceInstance | |
2021-04-15T21:45:42.194+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph: | |
module.xyz.aws_security_group.efs_access - *terraform.NodePlannableResourceInstance | |
------ | |
2021-04-15T21:45:42.194+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer | |
2021-04-15T21:45:42.194+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes) | |
2021-04-15T21:45:42.194+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer | |
2021-04-15T21:45:42.194+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes) | |
2021-04-15T21:45:42.194+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer | |
2021-04-15T21:45:42.194+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes) | |
2021-04-15T21:45:42.194+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer | |
2021-04-15T21:45:42.194+1200 [DEBUG] ReferenceTransformer: "module.xyz.aws_security_group.efs_access" references: [] | |
2021-04-15T21:45:42.194+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes) | |
2021-04-15T21:45:42.194+1200 [TRACE] Executing graph transform *terraform.RootTransformer | |
2021-04-15T21:45:42.194+1200 [TRACE] Completed graph transform *terraform.RootTransformer (no changes) | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": entering dynamic subgraph | |
2021-04-15T21:45:42.194+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": starting visit (*terraform.NodePlannableResourceInstance) | |
2021-04-15T21:45:42.194+1200 [TRACE] readResourceInstanceState: reading state for module.xyz.aws_security_group.efs_access | |
2021-04-15T21:45:42.194+1200 [TRACE] upgradeResourceState: schema version of module.xyz.aws_security_group.efs_access is still 1; calling provider "aws" for any other minor fixups | |
2021-04-15T21:45:42.194+1200 [TRACE] GRPCProvider: UpgradeResourceState | |
module.xyz.aws_security_group.efs_access: Refreshing state... [id=sg-0a76b35b37514b406] | |
2021-04-15T21:45:42.195+1200 [TRACE] GRPCProvider: ReadResource | |
2021-04-15T21:45:42.196+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:42 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeSecurityGroups Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: ec2.ap-southeast-2.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 79 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNW2DHGIPW/20210415/ap-southeast-2/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=16c482ef92b407e7a92364b8318620f98fd26a358bedde8bc790774c093cb66e | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094542Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q== | |
Accept-Encoding: gzip | |
Action=DescribeSecurityGroups&GroupId.1=sg-0a76b35b37514b406&Version=2016-11-15 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:42.195+1200 | |
2021-04-15T21:45:42.462+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:42 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeSecurityGroups Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 623 | |
Cache-Control: no-cache, no-store | |
Content-Type: text/xml;charset=UTF-8 | |
Date: Thu, 15 Apr 2021 09:45:42 GMT | |
Server: AmazonEC2 | |
Strict-Transport-Security: max-age=31536000; includeSubDomains | |
X-Amzn-Requestid: 28d1e2ce-7422-429b-a970-28a8c13ed1b0 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:42.461+1200 | |
2021-04-15T21:45:42.462+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:42 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?> | |
<DescribeSecurityGroupsResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/"> | |
<requestId>28d1e2ce-7422-429b-a970-28a8c13ed1b0</requestId> | |
<securityGroupInfo> | |
<item> | |
<ownerId>XXXXXXXXXXXXXXXX</ownerId> | |
<groupId>sg-0a76b35b37514b406</groupId> | |
<groupName>efs-access</groupName> | |
<groupDescription>Managed by Terraform</groupDescription> | |
<vpcId>vpc-0392b59df9aab82db</vpcId> | |
<ipPermissions/> | |
<ipPermissionsEgress/> | |
</item> | |
</securityGroupInfo> | |
</DescribeSecurityGroupsResponse>: timestamp=2021-04-15T21:45:42.462+1200 | |
2021-04-15T21:45:42.462+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for module.xyz.aws_security_group.efs_access during refresh. | |
- .tags: was null, but now cty.MapValEmpty(cty.String) | |
2021-04-15T21:45:42.463+1200 [TRACE] writeResourceInstanceState: using RefreshState for module.xyz.aws_security_group.efs_access | |
2021-04-15T21:45:42.463+1200 [TRACE] writeResourceInstanceState: writing current state object for module.xyz.aws_security_group.efs_access | |
2021-04-15T21:45:42.463+1200 [TRACE] Re-validating config for "module.xyz.aws_security_group.efs_access" | |
2021-04-15T21:45:42.463+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T21:45:42.464+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T21:45:42.465+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for module.xyz.aws_security_group.efs_access, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .revoke_rules_on_delete: planned value cty.False for a non-computed attribute | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
- .description: planned value cty.StringVal("Managed by Terraform") for a non-computed attribute | |
2021-04-15T21:45:42.465+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T21:45:42.466+1200 [TRACE] writeResourceInstanceState: writing current state object for module.xyz.aws_security_group.efs_access | |
2021-04-15T21:45:42.466+1200 [TRACE] writeChange: recorded DeleteThenCreate change for module.xyz.aws_security_group.efs_access | |
2021-04-15T21:45:42.466+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": visit complete | |
2021-04-15T21:45:42.466+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": dynamic subgraph completed successfully | |
2021-04-15T21:45:42.466+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access": visit complete | |
2021-04-15T21:45:42.466+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access (expand)": dynamic subgraph completed successfully | |
2021-04-15T21:45:42.466+1200 [TRACE] vertex "module.xyz.aws_security_group.efs_access (expand)": visit complete | |
2021-04-15T21:45:42.466+1200 [TRACE] vertex "module.xyz (close)": starting visit (*terraform.nodeCloseModule) | |
2021-04-15T21:45:42.466+1200 [TRACE] vertex "module.xyz (close)": visit complete | |
2021-04-15T21:45:43.210+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:43 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetInstanceProfile Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 1458 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 09:45:42 GMT | |
X-Amzn-Requestid: a074154e-1ea3-442a-8fd3-867dd659ef8a | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:43.210+1200 | |
2021-04-15T21:45:43.211+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:43 [DEBUG] [aws-sdk-go] <GetInstanceProfileResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetInstanceProfileResult> | |
<InstanceProfile> | |
<Path>/</Path> | |
<InstanceProfileName>instance</InstanceProfileName> | |
<Roles> | |
<member> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%YYYYYYYYYYYYYYYYYYYY/%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%2C%22Condition%22%3A%7B%22Bool%22%3A%7B%22aws%3AMultiFactorAuthPresent%22%3A%22true%22%7D%7D%7D%2C%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22ec2.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<RoleId>AROARF4HWBBNZMHKLRBIH</RoleId> | |
<RoleName>instance</RoleName> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXX:role/instance</Arn> | |
<CreateDate>2021-04-15T09:36:47Z</CreateDate> | |
</member> | |
</Roles> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXX:instance-profile/instance</Arn> | |
<InstanceProfileId>AIPARF4HWBBN73A3HL4EF</InstanceProfileId> | |
<CreateDate>2021-04-15T09:36:51Z</CreateDate> | |
<Tags/> | |
</InstanceProfile> | |
</GetInstanceProfileResult> | |
<ResponseMetadata> | |
<RequestId>a074154e-1ea3-442a-8fd3-867dd659ef8a</RequestId> | |
</ResponseMetadata> | |
</GetInstanceProfileResponse>: timestamp=2021-04-15T21:45:43.210+1200 | |
2021-04-15T21:45:43.211+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:43 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details: | |
---[ REQUEST POST-SIGN ]----------------------------- | |
POST / HTTP/1.1 | |
Host: iam.amazonaws.com | |
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws) | |
Content-Length: 51 | |
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNW2DHGIPW/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=a764bddeda8ad81acb519887c5800145869608c2cbec4763821a230a6c4fee2d | |
Content-Type: application/x-www-form-urlencoded; charset=utf-8 | |
X-Amz-Date: 20210415T094543Z | |
X-Amz-Security-Token: FwoGZXIvYXdzELv//////////wEaDHjiaXSSBWhz5PCQ1SK7Ac4zrdyfhsNpJw3LRdhGneGUeMWXBdRD5i6aQiS24PTBY+G+9ubGWK6rbsOvPARoQkuTJnAGzmDgLRdAU83/yJrAX/0eZsnexSI8e/wZ6HHax9/Dno7YxOm173fteDo2I/gZfdVx7Dn64jh97nQJr7C0w46qe97wDClwBiPInlEpiVP5UEWg9R7FnCfa9Oh3sacynzfGt49lMT9m2j/2S40Omqo6QAUcjsL5X2kQb8Wf/+mPaguvSM9gSWQowZbggwYyLWJgStQO5+J4zcegA3mJ+aed3uxHm4aLXNClOGDU5OBI2uKx5VqQWrRqJOCR7Q== | |
Accept-Encoding: gzip | |
Action=GetRole&RoleName=instance&Version=2010-05-08 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:43.211+1200 | |
2021-04-15T21:45:44.336+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:44 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details: | |
---[ RESPONSE ]-------------------------------------- | |
HTTP/1.1 200 OK | |
Connection: close | |
Content-Length: 1158 | |
Content-Type: text/xml | |
Date: Thu, 15 Apr 2021 09:45:43 GMT | |
X-Amzn-Requestid: 6276574c-7276-4bd2-8f38-9005c7defa99 | |
-----------------------------------------------------: timestamp=2021-04-15T21:45:44.336+1200 | |
2021-04-15T21:45:44.337+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 21:45:44 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/"> | |
<GetRoleResult> | |
<Role> | |
<Path>/</Path> | |
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%YYYYYYYYYYYYYYYYYYYY/%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%2C%22Condition%22%3A%7B%22Bool%22%3A%7B%22aws%3AMultiFactorAuthPresent%22%3A%22true%22%7D%7D%7D%2C%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22Service%22%3A%22ec2.amazonaws.com%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument> | |
<MaxSessionDuration>3600</MaxSessionDuration> | |
<RoleId>AROARF4HWBBNZMHKLRBIH</RoleId> | |
<RoleLastUsed/> | |
<RoleName>instance</RoleName> | |
<Description>A role for r-cloud instance</Description> | |
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXX:role/instance</Arn> | |
<CreateDate>2021-04-15T09:36:47Z</CreateDate> | |
</Role> | |
</GetRoleResult> | |
<ResponseMetadata> | |
<RequestId>6276574c-7276-4bd2-8f38-9005c7defa99</RequestId> | |
</ResponseMetadata> | |
</GetRoleResponse>: timestamp=2021-04-15T21:45:44.336+1200 | |
2021-04-15T21:45:44.337+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_instance_profile.instance_profile | |
2021-04-15T21:45:44.337+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_instance_profile.instance_profile | |
2021-04-15T21:45:44.338+1200 [TRACE] Re-validating config for "aws_iam_instance_profile.instance_profile" | |
2021-04-15T21:45:44.338+1200 [TRACE] GRPCProvider: ValidateResourceConfig | |
2021-04-15T21:45:44.338+1200 [TRACE] GRPCProvider: PlanResourceChange | |
2021-04-15T21:45:44.339+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_instance_profile.instance_profile, but we are tolerating it because it is using the legacy plugin SDK. | |
The following problems may be the cause of any confusing errors from downstream operations: | |
- .path: planned value cty.StringVal("/") for a non-computed attribute | |
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute | |
2021-04-15T21:45:44.339+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_instance_profile.instance_profile | |
2021-04-15T21:45:44.339+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_instance_profile.instance_profile | |
2021-04-15T21:45:44.339+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": visit complete | |
2021-04-15T21:45:44.339+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": dynamic subgraph completed successfully | |
2021-04-15T21:45:44.339+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile": visit complete | |
2021-04-15T21:45:44.340+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile (expand)": dynamic subgraph completed successfully | |
2021-04-15T21:45:44.340+1200 [TRACE] vertex "aws_iam_instance_profile.instance_profile (expand)": visit complete | |
2021-04-15T21:45:44.340+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary) | |
2021-04-15T21:45:44.340+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider) | |
2021-04-15T21:45:44.340+1200 [TRACE] GRPCProvider: Close | |
2021-04-15T21:45:44.340+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete | |
2021-04-15T21:45:44.341+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing" | |
2021-04-15T21:45:44.345+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=66297 | |
2021-04-15T21:45:44.345+1200 [DEBUG] provider: plugin exited | |
2021-04-15T21:45:44.345+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete | |
2021-04-15T21:45:44.345+1200 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule) | |
2021-04-15T21:45:44.345+1200 [TRACE] vertex "root": visit complete | |
2021-04-15T21:45:44.345+1200 [INFO] backend/local: plan operation completed | |
2021-04-15T21:45:44.345+1200 [INFO] backend/local: writing plan output to: plan | |
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: | |
~ update in-place | |
-/+ destroy and then create replacement | |
<= read (data resources) | |
Terraform will perform the following actions: | |
# aws_iam_role.instance_role will be updated in-place | |
~ resource "aws_iam_role" "instance_role" { | |
~ assume_role_policy = jsonencode( | |
~ { | |
~ Statement = [ | |
- { | |
- Action = "sts:AssumeRole" | |
- Condition = { | |
- Bool = { | |
- aws:MultiFactorAuthPresent = "true" | |
} | |
} | |
- Effect = "Allow" | |
- Principal = { | |
- AWS = "arn:aws:iam::202656505727:root" | |
} | |
- Sid = "" | |
}, | |
{ | |
Action = "sts:AssumeRole" | |
Effect = "Allow" | |
Principal = { | |
Service = "ec2.amazonaws.com" | |
} | |
Sid = "" | |
}, | |
] | |
# (1 unchanged element hidden) | |
} | |
) | |
id = "instance" | |
name = "instance" | |
tags = {} | |
# (8 unchanged attributes hidden) | |
# (1 unchanged block hidden) | |
} | |
# module.xyz.data.aws_vpc.test will be read during apply | |
# (config refers to values not yet known) | |
<= data "aws_vpc" "test" { | |
~ arn = "arn:aws:ec2:ap-southeast-2:XXXXXXXXXXXXXXXX:vpc/vpc-0392b59df9aab82db" -> (known after apply) | |
~ cidr_block = "172.50.0.0/16" -> (known after apply) | |
~ cidr_block_associations = [ | |
- { | |
- association_id = "vpc-cidr-assoc-0b50d9f69716ca74a" | |
- cidr_block = "172.50.0.0/16" | |
- state = "associated" | |
}, | |
] -> (known after apply) | |
~ default = false -> (known after apply) | |
~ dhcp_options_id = "dopt-11366a76" -> (known after apply) | |
~ enable_dns_hostnames = true -> (known after apply) | |
~ enable_dns_support = true -> (known after apply) | |
~ id = "vpc-0392b59df9aab82db" -> (known after apply) | |
~ instance_tenancy = "default" -> (known after apply) | |
~ ipv6_association_id = "vpc-cidr-assoc-0272c3454d0bb2122" -> (known after apply) | |
~ ipv6_cidr_block = "2406:da1c:d11:7d00::/56" -> (known after apply) | |
~ main_route_table_id = "rtb-0fef3d09dfacaa697" -> (known after apply) | |
~ owner_id = "XXXXXXXXXXXXXXXX" -> (known after apply) | |
~ state = "available" -> (known after apply) | |
~ tags = { | |
- "environment" = "sandpit" -> null | |
# (1 unchanged element hidden) | |
} | |
} | |
# module.xyz.aws_security_group.efs_access must be replaced | |
-/+ resource "aws_security_group" "efs_access" { | |
~ arn = "arn:aws:ec2:ap-southeast-2:XXXXXXXXXXXXXXXX:security-group/sg-0a76b35b37514b406" -> (known after apply) | |
~ egress = [] -> (known after apply) | |
~ id = "sg-0a76b35b37514b406" -> (known after apply) | |
~ ingress = [] -> (known after apply) | |
name = "efs-access" | |
+ name_prefix = (known after apply) | |
~ owner_id = "XXXXXXXXXXXXXXXX" -> (known after apply) | |
- tags = {} -> null | |
~ vpc_id = "vpc-0392b59df9aab82db" -> (known after apply) # forces replacement | |
# (2 unchanged attributes hidden) | |
} | |
Plan: 1 to add, 1 to change, 1 to destroy. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment