Skip to content

Instantly share code, notes, and snippets.

@karlroberts
Created August 28, 2019 07:32
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save karlroberts/193d04d8c98ed6583926f8c6f046f761 to your computer and use it in GitHub Desktop.
Save karlroberts/193d04d8c98ed6583926f8c6f046f761 to your computer and use it in GitHub Desktop.
terraform crash
2019/08/28 17:09:18 [INFO] Terraform version: 0.12.6
2019/08/28 17:09:18 [INFO] Go runtime version: go1.12.4
2019/08/28 17:09:18 [INFO] CLI args: []string{"/usr/local/terraform/0.12.6/terraform", "plan"}
2019/08/28 17:09:18 [DEBUG] Attempting to open CLI config file: /home/robertk/.terraformrc
2019/08/28 17:09:18 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2019/08/28 17:09:18 [INFO] CLI command args: []string{"plan"}
2019/08/28 17:09:18 [TRACE] Meta.Backend: built configuration for "s3" backend with hash value 3758110317
2019/08/28 17:09:18 [TRACE] Preserving existing state lineage "6afd498b-1a91-c1a4-e20b-b257e7469445"
2019/08/28 17:09:18 [TRACE] Preserving existing state lineage "6afd498b-1a91-c1a4-e20b-b257e7469445"
2019/08/28 17:09:18 [TRACE] Meta.Backend: working directory was previously initialized for "s3" backend
2019/08/28 17:09:18 [TRACE] Meta.Backend: using already-initialized, unchanged "s3" backend configuration
2019/08/28 17:09:18 [INFO] Setting AWS metadata API timeout to 100ms
2019/08/28 17:09:18 [INFO] Ignoring AWS metadata API endpoint at default location as it doesn't return any instance-id
2019/08/28 17:09:18 [INFO] AWS Auth provider used: "EnvProvider"
2019/08/28 17:09:18 [DEBUG] Trying to get account information via sts:GetCallerIdentity
2019/08/28 17:09:19 [TRACE] Meta.Backend: instantiated backend of type *s3.Backend
2019/08/28 17:09:19 [DEBUG] checking for provider in "."
2019/08/28 17:09:19 [DEBUG] checking for provider in "/usr/local/terraform/0.12.6"
2019/08/28 17:09:19 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64"
2019/08/28 17:09:19 [DEBUG] found provider "terraform-provider-aws_v2.24.0_x4"
2019/08/28 17:09:19 [DEBUG] found provider "terraform-provider-local_v1.3.0_x4"
2019/08/28 17:09:19 [DEBUG] found valid plugin: "aws", "2.24.0", "/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4"
2019/08/28 17:09:19 [DEBUG] found valid plugin: "local", "1.3.0", "/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4"
2019/08/28 17:09:19 [DEBUG] checking for provisioner in "."
2019/08/28 17:09:19 [DEBUG] checking for provisioner in "/usr/local/terraform/0.12.6"
2019/08/28 17:09:19 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64"
2019/08/28 17:09:19 [TRACE] Meta.Backend: backend *s3.Backend does not support operations, so wrapping it in a local backend
2019/08/28 17:09:19 [INFO] backend/local: starting Plan operation
2019/08/28 17:09:19 [TRACE] backend/local: requesting state manager for workspace "default"
2019/08/28 17:09:20 [TRACE] backend/local: requesting state lock for workspace "default"
2019/08/28 17:09:20 [TRACE] backend/local: reading remote state for workspace "default"
2019/08/28 17:09:20 [TRACE] backend/local: retrieving local state snapshot for workspace "default"
2019/08/28 17:09:20 [TRACE] backend/local: building context for current working directory
2019/08/28 17:09:20 [TRACE] terraform.NewContext: starting
2019/08/28 17:09:20 [TRACE] terraform.NewContext: resolving provider version selections
2019/08/28 17:09:20 [TRACE] terraform.NewContext: loading provider schemas
2019/08/28 17:09:20 [TRACE] LoadSchemas: retrieving schema for provider type "aws"
2019-08-28T17:09:20.517+1000 [INFO] plugin: configuring client automatic mTLS
2019-08-28T17:09:20.536+1000 [DEBUG] plugin: starting plugin: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 args=[/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4]
2019-08-28T17:09:20.537+1000 [DEBUG] plugin: plugin started: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 pid=14949
2019-08-28T17:09:20.537+1000 [DEBUG] plugin: waiting for RPC address: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4
2019-08-28T17:09:20.546+1000 [INFO] plugin.terraform-provider-aws_v2.24.0_x4: configuring server automatic mTLS: timestamp=2019-08-28T17:09:20.546+1000
2019-08-28T17:09:20.566+1000 [DEBUG] plugin: using plugin: version=5
2019-08-28T17:09:20.566+1000 [DEBUG] plugin.terraform-provider-aws_v2.24.0_x4: plugin address: network=unix address=/tmp/plugin062203727 timestamp=2019-08-28T17:09:20.566+1000
2019/08/28 17:09:20 [TRACE] GRPCProvider: GetSchema
2019/08/28 17:09:20 [TRACE] GRPCProvider: Close
2019-08-28T17:09:20.635+1000 [DEBUG] plugin: plugin process exited: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 pid=14949
2019-08-28T17:09:20.635+1000 [DEBUG] plugin: plugin exited
2019/08/28 17:09:20 [TRACE] LoadSchemas: retrieving schema for provider type "local"
2019-08-28T17:09:20.635+1000 [INFO] plugin: configuring client automatic mTLS
2019-08-28T17:09:20.660+1000 [DEBUG] plugin: starting plugin: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 args=[/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4]
2019-08-28T17:09:20.660+1000 [DEBUG] plugin: plugin started: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 pid=14968
2019-08-28T17:09:20.660+1000 [DEBUG] plugin: waiting for RPC address: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4
2019-08-28T17:09:20.665+1000 [INFO] plugin.terraform-provider-local_v1.3.0_x4: configuring server automatic mTLS: timestamp=2019-08-28T17:09:20.665+1000
2019-08-28T17:09:20.691+1000 [DEBUG] plugin: using plugin: version=5
2019-08-28T17:09:20.691+1000 [DEBUG] plugin.terraform-provider-local_v1.3.0_x4: plugin address: address=/tmp/plugin628022610 network=unix timestamp=2019-08-28T17:09:20.691+1000
2019/08/28 17:09:20 [TRACE] GRPCProvider: GetSchema
2019/08/28 17:09:20 [TRACE] GRPCProvider: Close
2019-08-28T17:09:20.740+1000 [DEBUG] plugin: plugin process exited: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 pid=14968
2019-08-28T17:09:20.740+1000 [DEBUG] plugin: plugin exited
2019/08/28 17:09:20 [TRACE] terraform.NewContext: complete
2019/08/28 17:09:20 [TRACE] backend/local: finished building terraform.Context
2019/08/28 17:09:20 [TRACE] backend/local: requesting interactive input, if necessary
2019/08/28 17:09:20 [TRACE] Context.Input: Prompting for variables
2019/08/28 17:09:20 [TRACE] Context.Input: Prompting for provider arguments
2019/08/28 17:09:20 [TRACE] Context.Input: Provider provider.aws declared at root.tf:14,1-15
2019/08/28 17:09:20 [TRACE] Context.Input: Provider provider.local implied by resource block at root.tf:61,1-47
2019/08/28 17:09:20 [TRACE] Context.Input: Input for provider.local: map[string]cty.Value{}
2019/08/28 17:09:20 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{}
2019/08/28 17:09:20 [TRACE] backend/local: running validation operation
2019/08/28 17:09:20 [INFO] terraform: building graph: GraphTypeValidate
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ConfigTransformer
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path:
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: cloudtrail-audit
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: iam-user-roles
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: kms-keys
2019/08/28 17:09:20 [TRACE] ConfigTransformer: Starting for path: kms-policies-roles
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.LocalTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.OutputTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.StateTransformer
2019/08/28 17:09:20 [TRACE] StateTransformer: creating nodes for deposed instance objects only
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/role_env_level_assume_matrix.tf:6,1-54
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:167,1-71
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:160,1-74
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "local_file.aws_config_suffix_file" (*terraform.NodeValidatableResource) config from root.tf:61,1-47
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:202,1-71
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.secret_groups" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/role_env_level_assume_matrix.tf:26,1-41
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/role_env_level_assume_matrix.tf:36,1-71
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_role.secret_janitor_role" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:136,1-46
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:184,1-78
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:177,1-80
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:146,1-61
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:139,1-70
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.aws_kms_alias.io_cmk1_alias" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/keys/main.tf:11,1-41
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_kms_alias.root_key_alias_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"root.tf", Start:hcl.Pos{Line:26, Column:1, Byte:512}, End:hcl.Pos{Line:26, Column:44, Byte:555}}
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" (*terraform.NodeValidatableResource) config from ../shared-modules/cloudtrail-audit/main.tf:64,1-51
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/keys/main.tf", Start:hcl.Pos{Line:132, Column:1, Byte:3671}, End:hcl.Pos{Line:132, Column:49, Byte:3719}}
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy.all_secret_policy" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/role_env_level_matrix.tf:72,1-46
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_caller_identity.current" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"root.tf", Start:hcl.Pos{Line:19, Column:1, Byte:294}, End:hcl.Pos{Line:19, Column:37, Byte:330}}
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" (*terraform.NodeValidatableResource) config from ../shared-modules/cloudtrail-audit/main.tf:35,1-44
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/role_env_level_assume_matrix.tf:47,1-62
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:191,1-49
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:34,1-67
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.data.aws_kms_key.io_cmk1_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/keys/main.tf", Start:hcl.Pos{Line:16, Column:1, Byte:317}, End:hcl.Pos{Line:16, Column:35, Byte:351}}
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_role.read_only" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:4,1-36
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/keys/main.tf:127,1-55
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:13,1-49
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" (*terraform.NodeValidatableResource) config from ../shared-modules/cloudtrail-audit/main.tf:98,1-48
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:72,1-63
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:67,1-52
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/kms-policies-roles/main.tf", Start:hcl.Pos{Line:179, Column:1, Byte:5332}, End:hcl.Pos{Line:179, Column:48, Byte:5379}}
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/kms-policies-roles/main.tf", Start:hcl.Pos{Line:175, Column:1, Byte:5226}, End:hcl.Pos{Line:175, Column:52, Byte:5277}}
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" (*terraform.NodeValidatableResource) config from ../shared-modules/cloudtrail-audit/main.tf:5,1-49
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.assume_read_only" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:83,1-45
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/keys/main.tf", Start:hcl.Pos{Line:20, Column:1, Byte:384}, End:hcl.Pos{Line:20, Column:43, Byte:426}}
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"../shared-modules/kms/keys/main.tf", Start:hcl.Pos{Line:136, Column:1, Byte:3759}, End:hcl.Pos{Line:136, Column:57, Byte:3815}}
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.read_only_admins" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:153,1-44
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:195,1-73
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_role.admin" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:41,1-32
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/keys/main.tf:25,1-47
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:168,1-72
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:173,1-56
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:115,1-56
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:98,1-78
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/kms-policies-roles/main.tf:107,1-50
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_group.admins" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:132,1-34
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.assume_admin" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/main.tf:99,1-41
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" (*terraform.NodeValidatableResource) config from ../shared-modules/user-roles-policies/direct_permissions.tf:4,1-57
2019/08/28 17:09:20 [TRACE] AttachResourceConfigTransformer: attaching to "module.kms-keys.aws_kms_key.io_cmk1" (*terraform.NodeValidatableResource) config from ../shared-modules/kms/keys/main.tf:4,1-33
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.RootVariableTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2019/08/28 17:09:20 [TRACE] ProviderConfigTransformer: attaching to "provider.aws" provider configuration from root.tf:14,1-15
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2019/08/28 17:09:20 [DEBUG] adding implicit provider configuration provider.local, implied first by local_file.aws_config_suffix_file
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias is provided by module.kms-keys.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit is provided by module.cloudtrail-audit.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_role.admin is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_key.io_cmk1 is provided by module.kms-keys.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: local_file.aws_config_suffix_file is provided by provider.local or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.admin_group_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: data.aws_kms_alias.root_key_alias_facts is provided by provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail is provided by module.cloudtrail-audit.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts is provided by module.kms-keys.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.all_secret_policy is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_role.read_only is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit is provided by module.cloudtrail-audit.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_read_only is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts is provided by module.kms-keys.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts is provided by module.kms-keys.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.read_only_admins is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 is provided by module.kms-keys.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.secret_janitor_policy is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.admins is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_admin is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_secret_role_policy is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.secret_groups is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_role.secret_janitor_role is provided by module.kms-policies-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_alias.io_cmk1_alias is provided by module.kms-keys.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_key.io_cmk1_facts is provided by module.kms-keys.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: data.aws_caller_identity.current is provided by provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail is provided by module.cloudtrail-audit.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.secret_group_membership is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.class1_kms_key_admins is provided by module.iam-user-roles.provider.aws or inherited equivalent
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: exact match for provider.local serving local_file.aws_config_suffix_file
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "local_file.aws_config_suffix_file" (*terraform.NodeValidatableResource) needs provider.local
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.admins uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.admins" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_key.io_cmk1 uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.aws_kms_key.io_cmk1" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.read_only_admins uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.read_only_admins" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.class1_kms_key_admins uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_admin uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.assume_admin" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.secret_groups uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.secret_groups" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_secret_role_policy uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.aws_kms_alias.io_cmk1_alias uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.aws_kms_alias.io_cmk1_alias" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.all_secret_policy uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.secret_janitor_policy uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_key.io_cmk1_facts uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.data.aws_kms_key.io_cmk1_facts" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_role.admin uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_role.admin" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_role.read_only uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_role.read_only" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.admin_group_membership uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: exact match for provider.aws serving data.aws_caller_identity.current
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "data.aws_caller_identity.current" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: exact match for provider.aws serving data.aws_kms_alias.root_key_alias_facts
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "data.aws_kms_alias.root_key_alias_facts" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_role.secret_janitor_role uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_role.secret_janitor_role" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_policy.assume_read_only uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_policy.assume_read_only" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.iam-user-roles.aws_iam_group_membership.secret_group_membership uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] ProviderTransformer: module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin uses inherited configuration provider.aws
2019/08/28 17:09:20 [DEBUG] ProviderTransformer: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" (*terraform.NodeValidatableResource) needs provider.aws
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
provider.local - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2019/08/28 17:09:20 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
provider.local - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.aws
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_role.read_only
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.assume_read_only
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.read_only_admins
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy.secret_janitor_policy
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider.local
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.admins
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.assume_admin
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.assume_secret_role_policy
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.secret_groups
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_role.secret_janitor_role
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.aws_kms_alias.io_cmk1_alias
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_caller_identity.current
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.secret_group_membership
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group.class1_kms_key_admins
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.data.aws_kms_key.io_cmk1_facts
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_role.admin
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.aws_kms_key.io_cmk1
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to local_file.aws_config_suffix_file
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.iam-user-roles.aws_iam_group_membership.admin_group_membership
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_kms_alias.root_key_alias_facts
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts
2019/08/28 17:09:20 [TRACE] AttachSchemaTransformer: attaching resource schema to module.kms-policies-roles.aws_iam_policy.all_secret_policy
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.var.audit_key_prefix" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.assume_env_level_role_access" references: [var.assume_env_level_role_access]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.read_only_admins" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local.security_levels" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_cloudtrail_alias_name" references: [module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_cloudtrail_key_id" references: [module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" references: [module.iam-user-roles.aws_iam_group.class1_kms_key_admins module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" references: [module.kms-keys.local.account_arns]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" references: [module.kms-policies-roles.aws_iam_policy.secret_janitor_policy module.kms-policies-roles.aws_iam_role.secret_janitor_role]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_roles (orphan)" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_policies (orphan)" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.target_region" references: [var.target_region]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" references: [module.kms-policies-roles.var.target_region module.kms-policies-roles.var.target_account]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "provider.local" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.cloudtrail_key_arn" references: [module.kms-keys.output.aws_kms_cloudtrail_arn]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_arn" references: [module.kms-keys.output.aws_kms_io_root_alias_arn]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.read_actions" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.admins" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.secret_janitor_policy_arn" references: [module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_key_id" references: [module.kms-keys.output.aws_kms_io_root_alias_key_id]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.secProdTupMap" references: [module.kms-policies-roles.local.sec_product_map]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_policy_arns (orphan)" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.secret_roles" references: [module.kms-policies-roles.output.allroles]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.assume_admin" references: [module.iam-user-roles.aws_iam_role.admin]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local.security_envs" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.local.account_arns" references: [module.kms-keys.var.trusted_user_accounts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.class1_secret_kms_keys" references: [data.aws_kms_alias.root_key_alias_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.security_ssm_role" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_alias_name" references: [module.kms-keys.output.aws_kms_io_root_alias_name]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.trusted_user_accounts" references: [local.current_account var.trusted_user_accounts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" references: [module.iam-user-roles.var.env_level_role_matrix module.iam-user-roles.var.secret_roles]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_admin_role" references: [module.kms-policies-roles.output.class1KmsKeyAdminRole_arn]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.write_actions" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.secret_groups" references: [module.iam-user-roles.var.env_level_role_matrix]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_role.secret_janitor_role" references: [module.kms-policies-roles.local.account_arns]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.cloudtrail_key_alias_name" references: [module.kms-keys.output.aws_kms_cloudtrail_alias_name]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.aws_kms_alias.io_cmk1_alias" references: [module.kms-keys.aws_kms_key.io_cmk1]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_io_root_alias_name" references: [module.kms-keys.aws_kms_alias.io_cmk1_alias]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" references: [module.iam-user-roles.var.own_credentials_mfa_managers_users module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" references: [module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" references: [module.iam-user-roles.aws_iam_policy.assume_admin module.iam-user-roles.aws_iam_group.admins]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.assume_env_level_role_access" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.data.aws_kms_key.io_cmk1_facts" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local.sec_product" references: [local.security_envs local.security_levels]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_cloudtrail_state" references: [module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.secret_janitor_policy" references: [module.kms-policies-roles.aws_iam_policy.secret_janitor_policy]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "data.aws_caller_identity.current" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" references: [module.iam-user-roles.var.env_level_role_matrix module.iam-user-roles.var.assume_env_level_role_access module.iam-user-roles.aws_iam_group.secret_groups]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.root_key_state" references: [module.kms-keys.output.aws_kms_io_root_cmk1_state]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.env_level_role_matrix" references: [module.kms-policies-roles.output.secProdTupMap]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" references: [module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.ssm_role_actions" references: [module.kms-policies-roles.var.read_actions module.kms-policies-roles.var.write_actions]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.aws_iam_role_arn" references: [module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" references: [module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" references: [module.kms-policies-roles.aws_iam_role.secret_janitor_role module.kms-policies-roles.aws_iam_role.secret_janitor_role]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.class1_key_arns_str" references: [module.kms-policies-roles.var.class1_secret_kms_keys]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.cloudtrail_key_state" references: [module.kms-keys.output.aws_kms_cloudtrail_state]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.target_account" references: [var.target_account]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.cloudtrail_key_key_id" references: [module.kms-keys.output.aws_kms_cloudtrail_key_id]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_role.admin" references: [module.iam-user-roles.local.account_arns]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.local.account_arns" references: [module.iam-user-roles.var.trusted_user_accounts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_rolee_arns (orphan)" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.trusted_user_accounts" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" references: [module.iam-user-roles.var.class1_key_admin_role_arn]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" references: [module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.allsecretsPolicies" references: [module.kms-policies-roles.aws_iam_policy.all_secret_policy]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.security_levels" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.class1_secret_kms_key_alias" references: [data.aws_kms_alias.root_key_alias_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local.current_account" references: [data.aws_caller_identity.current]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.class1_key_admin_role_arn" references: [module.kms-policies-roles.output.class1KmsKeyAdminRole_arn]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.read_only_users" references: [var.read_only_users]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.class1_key_alias_arns_str" references: [module.kms-policies-roles.var.class1_secret_kms_key_alias]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn" references: [module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.read_only_users" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.aws_kms_key.io_cmk1" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.sec_product_map" references: [module.kms-policies-roles.local.sec_product]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_io_root_alias_key_id" references: [module.kms-keys.data.aws_kms_key.io_cmk1_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_all_secrets_policies" references: [module.kms-policies-roles.output.secret_janitor_policy module.kms-policies-roles.output.allsecretsPolicies]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.own_credentials_mfa_managers_users" references: [var.own_credentials_mfa_managers_users]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" references: [module.iam-user-roles.var.read_only_users module.iam-user-roles.aws_iam_group.read_only_admins]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" references: [module.iam-user-roles.aws_iam_group.read_only_admins module.iam-user-roles.aws_iam_policy.assume_read_only]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.security_envs" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.target_account" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "local_file.aws_config_suffix_file" references: [local.current_account var.target_account local.current_account var.target_account local.current_account module.kms-policies-roles.output.secProdTupMap]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" references: [module.iam-user-roles.var.class1_key_admin_users module.iam-user-roles.aws_iam_group.class1_kms_key_admins]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" references: [module.iam-user-roles.var.env_level_role_matrix module.iam-user-roles.aws_iam_group.secret_groups module.iam-user-roles.aws_iam_policy.assume_secret_role_policy]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" references: [module.iam-user-roles.aws_iam_group.admins module.iam-user-roles.var.admin_users]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.class1_key_admin_users" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" references: [module.kms-policies-roles.local.ssm_role_actions module.kms-policies-roles.var.target_region module.kms-policies-roles.var.target_account]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.sec_product" references: [module.kms-policies-roles.local.security_envs module.kms-policies-roles.local.security_levels module.kms-policies-roles.local.security_ssm_role]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_io_root_alias_arn" references: [module.kms-keys.data.aws_kms_key.io_cmk1_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "data.aws_kms_alias.root_key_alias_facts" references: [module.kms-keys.output.aws_kms_io_root_alias_name]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" references: [module.iam-user-roles.aws_iam_role.read_only]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.var.trusted_user_accounts" references: [local.current_account var.trusted_user_accounts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.var.trusted_user_accounts" references: [local.current_account var.trusted_user_accounts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_io_root_cmk1_state" references: [module.kms-keys.data.aws_kms_key.io_cmk1_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.allroles" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.target_region" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.class1_key_admin_users" references: [var.class1_key_admin_users]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "provider.aws" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_role.read_only" references: [module.iam-user-roles.local.account_arns]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" references: [module.kms-policies-roles.local.class1_key_arns_str module.kms-policies-roles.local.class1_key_alias_arns_str]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.output.aws_kms_cloudtrail_arn" references: [module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" references: [module.iam-user-roles.aws_iam_role.admin]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" references: [module.kms-policies-roles.local.account_arns]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" references: [module.kms-policies-roles.aws_iam_policy.secret_janitor_policy]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.local.account_arns" references: [module.kms-policies-roles.var.trusted_user_accounts]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.own_credentials_mfa_managers_users" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.aws_iam_policy.assume_read_only" references: [module.iam-user-roles.aws_iam_role.read_only]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "var.admin_users" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.iam-user-roles.var.admin_users" references: [var.admin_users]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" references: []
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "module.kms-policies-roles.output.aws_iam_role" references: [module.kms-policies-roles.aws_iam_role.secret_janitor_role]
2019/08/28 17:09:20 [DEBUG] ReferenceTransformer: "output.kms_secret_rolee_names (orphan)" references: []
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
local.current_account - *terraform.NodeLocal
data.aws_caller_identity.current - *terraform.NodeValidatableResource
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
provider.local - *terraform.NodeApplyableProvider
var.target_account - *terraform.NodeRootVariable
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
var.admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
var.read_only_users - *terraform.NodeRootVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
var.target_account - *terraform.NodeRootVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
var.target_region - *terraform.NodeRootVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
local.current_account - *terraform.NodeLocal
data.aws_caller_identity.current - *terraform.NodeValidatableResource
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
provider.local - *terraform.NodeApplyableProvider
var.target_account - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
var.admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
var.read_only_users - *terraform.NodeRootVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
var.target_account - *terraform.NodeRootVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
var.target_region - *terraform.NodeRootVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.TargetsTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
local.current_account - *terraform.NodeLocal
data.aws_caller_identity.current - *terraform.NodeValidatableResource
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
provider.local - *terraform.NodeApplyableProvider
var.target_account - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
var.admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
var.read_only_users - *terraform.NodeRootVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
var.target_account - *terraform.NodeRootVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
var.target_region - *terraform.NodeRootVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
provider.local (close) - *terraform.graphNodeCloseProvider
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes)
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.RootTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
local.current_account - *terraform.NodeLocal
data.aws_caller_identity.current - *terraform.NodeValidatableResource
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
provider.local - *terraform.NodeApplyableProvider
var.target_account - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
var.admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
var.read_only_users - *terraform.NodeRootVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
var.target_account - *terraform.NodeRootVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
var.target_region - *terraform.NodeRootVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
data.aws_caller_identity.current - *terraform.NodeValidatableResource
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
provider.local - *terraform.NodeApplyableProvider
provider.local (close) - *terraform.graphNodeCloseProvider
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
provider.local - *terraform.NodeApplyableProvider
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.local (close) - *terraform.graphNodeCloseProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2019/08/28 17:09:20 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
data.aws_caller_identity.current - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
local.current_account - *terraform.NodeLocal
data.aws_caller_identity.current - *terraform.NodeValidatableResource
local.sec_product - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local.security_envs - *terraform.NodeLocal
local.security_levels - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
local.current_account - *terraform.NodeLocal
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
provider.local - *terraform.NodeApplyableProvider
var.target_account - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
local.sec_product - *terraform.NodeLocal
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.cloudtrail-audit.var.audit_key_prefix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.read_only_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.secret_groups - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_secret_role_policy - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.class1_kms_key_admins - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_role.admin - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.aws_iam_role.read_only - *terraform.NodeValidatableResource
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.local.account_arns - *terraform.NodeLocal
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.iam-user-roles.var.admin_users - *terraform.NodeApplyableModuleVariable
var.admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.assume_env_level_role_access - *terraform.NodeApplyableModuleVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
module.iam-user-roles.var.class1_key_admin_role_arn - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.iam-user-roles.var.class1_key_admin_users - *terraform.NodeApplyableModuleVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
module.iam-user-roles.var.env_level_role_matrix - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.iam-user-roles.var.own_credentials_mfa_managers_users - *terraform.NodeApplyableModuleVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
module.iam-user-roles.var.read_only_users - *terraform.NodeApplyableModuleVariable
var.read_only_users - *terraform.NodeRootVariable
module.iam-user-roles.var.secret_roles - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.iam-user-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1 - *terraform.NodeValidatableResource
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.aws_kms_key.io_cmk1 - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
provider.aws - *terraform.NodeApplyableProvider
module.kms-keys.local.account_arns - *terraform.NodeLocal
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.aws_kms_alias.io_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
provider.aws - *terraform.NodeApplyableProvider
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.local.account_arns - *terraform.NodeLocal
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_alias_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.class1_key_arns_str - *terraform.NodeLocal
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.local.sec_product - *terraform.NodeLocal
module.kms-policies-roles.local.security_envs - *terraform.NodeLocal
module.kms-policies-roles.local.security_levels - *terraform.NodeLocal
module.kms-policies-roles.local.security_ssm_role - *terraform.NodeLocal
module.kms-policies-roles.local.ssm_role_actions - *terraform.NodeLocal
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.output.allroles - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.secret_janitor_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.aws_iam_role_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secProdTupMap - *terraform.NodeApplyableOutput
module.kms-policies-roles.local.sec_product_map - *terraform.NodeLocal
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
module.kms-policies-roles.aws_iam_policy.secret_janitor_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.output.secret_janitor_policy_arn - *terraform.NodeApplyableOutput
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_key_alias - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.class1_secret_kms_keys - *terraform.NodeApplyableModuleVariable
data.aws_kms_alias.root_key_alias_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.var.read_actions - *terraform.NodeApplyableModuleVariable
module.kms-policies-roles.var.target_account - *terraform.NodeApplyableModuleVariable
var.target_account - *terraform.NodeRootVariable
module.kms-policies-roles.var.target_region - *terraform.NodeApplyableModuleVariable
var.target_region - *terraform.NodeRootVariable
module.kms-policies-roles.var.trusted_user_accounts - *terraform.NodeApplyableModuleVariable
local.current_account - *terraform.NodeLocal
var.trusted_user_accounts - *terraform.NodeRootVariable
module.kms-policies-roles.var.write_actions - *terraform.NodeApplyableModuleVariable
output.cloudtrail_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_alias_name - *terraform.NodeApplyableOutput
output.cloudtrail_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_arn - *terraform.NodeApplyableOutput
output.cloudtrail_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_key_id - *terraform.NodeApplyableOutput
output.cloudtrail_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_cloudtrail_state - *terraform.NodeApplyableOutput
output.kms_all_secrets_policies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.allsecretsPolicies - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.secret_janitor_policy - *terraform.NodeApplyableOutput
output.kms_secret_policies (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_policy_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_arns (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_rolee_names (orphan) - *terraform.NodeOutputOrphan
output.kms_secret_roles (orphan) - *terraform.NodeOutputOrphan
output.root_key_admin_role - *terraform.NodeApplyableOutput
module.kms-policies-roles.output.class1KmsKeyAdminRole_arn - *terraform.NodeApplyableOutput
output.root_key_alias_name - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_name - *terraform.NodeApplyableOutput
output.root_key_arn - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_arn - *terraform.NodeApplyableOutput
output.root_key_key_id - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_alias_key_id - *terraform.NodeApplyableOutput
output.root_key_state - *terraform.NodeApplyableOutput
module.kms-keys.output.aws_kms_io_root_cmk1_state - *terraform.NodeApplyableOutput
provider.aws - *terraform.NodeApplyableProvider
provider.aws (close) - *terraform.graphNodeCloseProvider
module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit - *terraform.NodeValidatableResource
module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_group_membership.secret_group_membership - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment - *terraform.NodeValidatableResource
module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement - *terraform.NodeValidatableResource
module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts - *terraform.NodeValidatableResource
module.kms-keys.data.aws_kms_key.io_cmk1_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy.all_secret_policy - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts - *terraform.NodeValidatableResource
module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts - *terraform.NodeValidatableResource
provider.local - *terraform.NodeApplyableProvider
provider.local (close) - *terraform.graphNodeCloseProvider
local_file.aws_config_suffix_file - *terraform.NodeValidatableResource
root - terraform.graphNodeRoot
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider.aws (close) - *terraform.graphNodeCloseProvider
provider.local (close) - *terraform.graphNodeCloseProvider
var.admin_users - *terraform.NodeRootVariable
var.assume_env_level_role_access - *terraform.NodeRootVariable
var.class1_key_admin_users - *terraform.NodeRootVariable
var.own_credentials_mfa_managers_users - *terraform.NodeRootVariable
var.read_only_users - *terraform.NodeRootVariable
var.target_account - *terraform.NodeRootVariable
var.target_region - *terraform.NodeRootVariable
var.trusted_user_accounts - *terraform.NodeRootVariable
------
2019/08/28 17:09:20 [DEBUG] Starting graph walk: walkValidate
2019/08/28 17:09:20 [TRACE] dag/walk: updating graph
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.class1_secret_kms_keys"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local.sec_product"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_rolee_arns (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_io_root_alias_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_policy_arns (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_state"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_all_secrets_policies"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "provider.local (close)"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.security_ssm_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_admin_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.class1_kms_key_admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.aws_iam_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.secProdTupMap"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_io_root_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.var.audit_key_prefix"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.aws_kms_alias.io_cmk1_alias"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.read_only_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy.all_secret_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_role.read_only"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.local.account_arns"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.assume_env_level_role_access"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.aws_kms_key.io_cmk1"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local.security_envs"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "meta.count-boundary (EachMode fixup)"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.security_levels"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_policies (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_role.secret_janitor_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.cloudtrail_key_key_id"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_cloudtrail_key_id"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.secret_groups"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.sec_product"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.target_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local_file.aws_config_suffix_file"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.sec_product_map"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_io_root_alias_key_id"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.class1_key_admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.local.account_arns"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.cloudtrail_key_state"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.assume_read_only"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.class1_secret_kms_key_alias"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.read_only_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.own_credentials_mfa_managers_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.class1_key_admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.secret_janitor_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.aws_iam_role_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.secret_roles"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "data.aws_caller_identity.current"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "data.aws_kms_alias.root_key_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.assume_env_level_role_access"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "provider.local"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.target_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.read_only_admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.target_region"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.cloudtrail_key_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.write_actions"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_cloudtrail_state"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.class1_key_alias_arns_str"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.own_credentials_mfa_managers_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.var.read_actions"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.cloudtrail_key_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.env_level_role_matrix"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local.security_levels"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group.admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.secret_janitor_policy_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_cloudtrail_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.account_arns"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_roles (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "provider.aws (close)"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.class1_key_arns_str"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "var.target_region"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.class1_key_admin_role_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.allroles"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "local.current_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_io_root_cmk1_state"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.security_envs"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.data.aws_kms_key.io_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.local.ssm_role_actions"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.output.aws_kms_cloudtrail_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.root_key_key_id"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.var.admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "root"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "output.kms_secret_rolee_names (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_policy.assume_admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.iam-user-roles.aws_iam_role.admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added new vertex: "module.kms-policies-roles.output.allsecretsPolicies"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_all_secrets_policies"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_arn" waiting on "module.kms-keys.output.aws_kms_io_root_alias_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" waiting on "module.iam-user-roles.aws_iam_group.read_only_admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local_file.aws_config_suffix_file" waiting on "module.kms-policies-roles.output.secProdTupMap"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_alias_name" waiting on "module.kms-keys.output.aws_kms_io_root_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_io_root_cmk1_state" waiting on "module.kms-keys.data.aws_kms_key.io_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.read_only_users" waiting on "var.read_only_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" waiting on "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" waiting on "module.iam-user-roles.aws_iam_group.secret_groups"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_role.read_only" waiting on "module.iam-user-roles.local.account_arns"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.target_region" waiting on "var.target_region"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_policy_arns (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.trusted_user_accounts" waiting on "var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_cloudtrail_key_id" waiting on "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.allsecretsPolicies" waiting on "module.kms-policies-roles.aws_iam_policy.all_secret_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "root" waiting on "provider.local (close)"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cloudtrail-audit.var.audit_key_prefix"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_rolee_arns (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.output.aws_iam_role_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.cloudtrail_key_alias_name" waiting on "module.kms-keys.output.aws_kms_cloudtrail_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.sec_product_map" waiting on "module.kms-policies-roles.local.sec_product"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local.sec_product" waiting on "local.security_envs"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.secret_janitor_policy" waiting on "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" waiting on "module.iam-user-roles.var.assume_env_level_role_access"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_io_root_alias_arn" waiting on "module.kms-keys.data.aws_kms_key.io_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "local.sec_product"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn" waiting on "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.cloudtrail_key_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.env_level_role_matrix" waiting on "module.kms-policies-roles.output.secProdTupMap"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" waiting on "module.iam-user-roles.aws_iam_group.admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts" waiting on "module.kms-policies-roles.aws_iam_role.secret_janitor_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "data.aws_caller_identity.current" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" waiting on "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" waiting on "module.iam-user-roles.aws_iam_group.class1_kms_key_admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.class1_key_alias_arns_str" waiting on "module.kms-policies-roles.var.class1_secret_kms_key_alias"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.cloudtrail_key_state" waiting on "module.kms-keys.output.aws_kms_cloudtrail_state"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role" waiting on "module.kms-policies-roles.local.account_arns"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.data.aws_kms_key.io_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" waiting on "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.own_credentials_mfa_managers_users" waiting on "var.own_credentials_mfa_managers_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.secProdTupMap" waiting on "module.kms-policies-roles.local.sec_product_map"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.output.secret_janitor_policy_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_policies (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_cloudtrail_alias_name" waiting on "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.secret_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment" waiting on "module.kms-policies-roles.aws_iam_role.secret_janitor_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts" waiting on "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "root" waiting on "provider.aws (close)"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" waiting on "module.iam-user-roles.var.admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership" waiting on "module.iam-user-roles.var.class1_key_admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" waiting on "module.kms-policies-roles.var.target_region"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" waiting on "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_io_root_alias_key_id" waiting on "module.kms-keys.data.aws_kms_key.io_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_admin_role" waiting on "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.class1_secret_kms_key_alias" waiting on "data.aws_kms_alias.root_key_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.trusted_user_accounts" waiting on "local.current_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.aws_kms_alias.io_cmk1_alias" waiting on "module.kms-keys.aws_kms_key.io_cmk1"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local_file.aws_config_suffix_file" waiting on "provider.local"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.aws_kms_key.io_cmk1" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_io_root_alias_name" waiting on "module.kms-keys.aws_kms_alias.io_cmk1_alias"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.trusted_user_accounts" waiting on "var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.aws_iam_role" waiting on "module.kms-policies-roles.aws_iam_role.secret_janitor_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" waiting on "module.iam-user-roles.var.read_only_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.secret_groups" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.class1_kms_key_admins" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local_file.aws_config_suffix_file" waiting on "local.current_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.aws_iam_role_arn" waiting on "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.target_account" waiting on "var.target_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_state" waiting on "module.kms-keys.output.aws_kms_io_root_cmk1_state"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.assume_env_level_role_access" waiting on "var.assume_env_level_role_access"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.output.secret_janitor_policy_arn" waiting on "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" waiting on "module.kms-policies-roles.var.target_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.local (close)" waiting on "local_file.aws_config_suffix_file"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.secret_roles" waiting on "module.kms-policies-roles.output.allroles"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.admin_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" waiting on "module.iam-user-roles.var.own_credentials_mfa_managers_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_admin_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" waiting on "module.kms-policies-roles.local.ssm_role_actions"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_key_id"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local.current_account" waiting on "data.aws_caller_identity.current"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.cloudtrail_key_key_id"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_admin" waiting on "module.iam-user-roles.aws_iam_role.admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.root_key_key_id" waiting on "module.kms-keys.output.aws_kms_io_root_alias_key_id"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment" waiting on "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.var.class1_secret_kms_keys" waiting on "data.aws_kms_alias.root_key_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.class1_key_admin_role_arn" waiting on "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.cloudtrail_key_arn" waiting on "module.kms-keys.output.aws_kms_cloudtrail_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.var.trusted_user_accounts" waiting on "local.current_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.output.aws_iam_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.var.trusted_user_accounts" waiting on "var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership" waiting on "module.iam-user-roles.aws_iam_group.read_only_admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local_file.aws_config_suffix_file" waiting on "var.target_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership" waiting on "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_role.secret_janitor_role" waiting on "module.kms-policies-roles.local.account_arns"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.sec_product" waiting on "module.kms-policies-roles.local.security_levels"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.admins" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "data.aws_kms_alias.root_key_alias_facts" waiting on "module.kms-keys.output.aws_kms_io_root_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.sec_product" waiting on "module.kms-policies-roles.local.security_envs"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" waiting on "module.kms-policies-roles.local.class1_key_arns_str"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment" waiting on "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" waiting on "module.kms-policies-roles.var.target_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.ssm_role_actions" waiting on "module.kms-policies-roles.var.read_actions"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.cloudtrail_key_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.all_secret_policy" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_rolee_names (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin" waiting on "module.iam-user-roles.var.class1_key_admin_role_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.aws_iam_policy.all_secret_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement" waiting on "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_alias_name"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement" waiting on "module.iam-user-roles.aws_iam_group.class1_kms_key_admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "local_file.aws_config_suffix_file"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" waiting on "module.iam-user-roles.var.secret_roles"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.kms_secret_roles (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy" waiting on "module.iam-user-roles.var.env_level_role_matrix"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.kms_all_secrets_policies" waiting on "module.kms-policies-roles.output.allsecretsPolicies"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.cloudtrail_key_key_id" waiting on "module.kms-keys.output.aws_kms_cloudtrail_key_id"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.admin_users" waiting on "var.admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment" waiting on "module.iam-user-roles.aws_iam_policy.assume_admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.account_arns" waiting on "module.kms-policies-roles.var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.ssm_role_actions" waiting on "module.kms-policies-roles.var.write_actions"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1" waiting on "module.kms-keys.local.account_arns"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias" waiting on "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.data.aws_kms_key.io_cmk1_facts" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.local.account_arns" waiting on "module.kms-keys.var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.sec_product" waiting on "module.kms-policies-roles.local.security_ssm_role"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.local.account_arns" waiting on "module.iam-user-roles.var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "local.sec_product" waiting on "local.security_levels"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.read_only_admins" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin" waiting on "module.kms-policies-roles.local.class1_key_alias_arns_str"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.secret_group_membership" waiting on "module.iam-user-roles.aws_iam_group.secret_groups"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_cloudtrail_arn" waiting on "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts" waiting on "provider.aws"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-keys.output.aws_kms_cloudtrail_state" waiting on "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.cloudtrail_key_state"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group.secret_groups" waiting on "module.iam-user-roles.var.env_level_role_matrix"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "output.kms_all_secrets_policies" waiting on "module.kms-policies-roles.output.secret_janitor_policy"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.trusted_user_accounts" waiting on "local.current_account"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_role.admin" waiting on "module.iam-user-roles.local.account_arns"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy.assume_read_only" waiting on "module.iam-user-roles.aws_iam_role.read_only"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.local.class1_key_arns_str" waiting on "module.kms-policies-roles.var.class1_secret_kms_keys"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit" waiting on "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_group_membership.admin_group_membership" waiting on "module.iam-user-roles.aws_iam_group.admins"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.iam-user-roles.aws_iam_group_membership.secret_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment" waiting on "module.iam-user-roles.aws_iam_role.admin"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment" waiting on "module.iam-user-roles.aws_iam_role.read_only"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "output.root_key_state"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "root" waiting on "meta.count-boundary (EachMode fixup)"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment" waiting on "module.iam-user-roles.aws_iam_policy.assume_read_only"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy" waiting on "module.kms-policies-roles.var.target_region"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "module.iam-user-roles.var.class1_key_admin_users" waiting on "var.class1_key_admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "provider.aws (close)" waiting on "module.iam-user-roles.aws_iam_group_membership.admin_group_membership"
2019/08/28 17:09:20 [TRACE] dag/walk: added edge: "meta.count-boundary (EachMode fixup)" waiting on "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_alias_name", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_io_root_alias_key_id", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.aws_kms_alias.cloudtrail_audit_cmk1_alias", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.data.aws_kms_key.io_cmk1_facts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.read_only_users", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_role.class1_kms_key_admin_role", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.kms_all_secrets_policies", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.own_credentials_mfa_managers_users", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.ssm_role_actions", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "provider.aws (close)", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.allsecretsPolicies", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_io_root_alias_arn", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.data.aws_iam_role.secret_janitor_role_facts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.read_only_admin_group_membership", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.secret_janitor_policy_arn", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_arn", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.assume_read_only_policy_attachment", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.cloudtrail-audit.aws_cloudtrail.skyfii-global-audit", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.secret_roles", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.assume_admin", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy.class1_kms_key_admin", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.secret_janitor_policy", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.class1_key_alias_arns_str", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_io_root_alias_name", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "local.current_account", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "data.aws_kms_alias.root_key_alias_facts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_role.read_only", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.read_only_policy_attachment", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.read_only_admins", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_cloudtrail_arn", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.secret_groups", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.assume_env_level_role_access", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.cloudtrail_key_arn", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.assume_secret_policy_attachment", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.cloudtrail_key_alias_name", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.cloudtrail_key_state", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_cloudtrail_state", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.target_region", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.trusted_user_accounts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_cloudtrail_key_id", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.sec_product_map", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.secret_group_membership", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy_attachment.class1_kms_key_admin_policy_attachment", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_io_root_cmk1_state", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.assume_class1_kms_key_admin", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.aws_iam_role_arn", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.target_account", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_admin_role", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.aws_kms_key.io_cmk1", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_state", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "provider.local (close)", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.output.aws_kms_cloudtrail_alias_name", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.root_key_key_id", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.var.trusted_user_accounts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.sec_product", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.admins", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "meta.count-boundary (EachMode fixup)", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "local_file.aws_config_suffix_file", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_role.admin", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy.all_secret_policy", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.trusted_user_accounts", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "output.cloudtrail_key_key_id", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.local.account_arns", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.assume_read_only", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "root", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "data.aws_caller_identity.current", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.class1_key_arns_str", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.admin_policy_attachment", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.secProdTupMap", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group.class1_kms_key_admins", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.local.account_arns", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy_attachment.secret_janitor_policy_attachment", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.assume_admin_policy_attachment", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy_attachment.class1_kms_key_admins_attachement", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.aws_kms_alias.io_cmk1_alias", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.aws_iam_role", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.admin_users", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "local.sec_product", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.output.class1KmsKeyAdminRole_arn", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.class1_secret_kms_key_alias", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.class1_key_admin_role_arn", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.aws_iam_role.secret_janitor_role", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.env_level_role_matrix", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_group_membership.admin_group_membership", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.local.account_arns", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-keys.aws_kms_key.cloudtrail_audit_cmk1", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.var.class1_key_admin_users", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.kms-policies-roles.var.class1_secret_kms_keys", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: dependencies changed for "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa", sending new deps
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.target_region"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.var.read_actions"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.read_actions": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "local.security_levels"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.read_actions": evaluating
2019/08/28 17:09:20 [TRACE] vertex "local.security_levels": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.output.allroles"
2019/08/28 17:09:20 [TRACE] vertex "local.security_levels": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.allroles": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.security_levels"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_levels": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "provider.aws"
2019/08/28 17:09:20 [TRACE] vertex "provider.aws": starting visit (*terraform.NodeApplyableProvider)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.allroles": evaluating
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.var.write_actions"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.read_only_users"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "local.security_envs"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_policies (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.admin_users"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_policy_arns (orphan)"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.own_credentials_mfa_managers_users"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "provider.local"
2019/08/28 17:09:20 [TRACE] vertex "var.own_credentials_mfa_managers_users": starting visit (*terraform.NodeRootVariable)
2019/08/28 17:09:20 [TRACE] vertex "provider.local": starting visit (*terraform.NodeApplyableProvider)
2019/08/28 17:09:20 [TRACE] vertex "var.own_credentials_mfa_managers_users": visit complete
2019/08/28 17:09:20 [TRACE] vertex "var.target_region": starting visit (*terraform.NodeRootVariable)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.own_credentials_mfa_managers_users"
2019/08/28 17:09:20 [TRACE] vertex "provider.local": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.own_credentials_mfa_managers_users": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: provider.local
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.own_credentials_mfa_managers_users": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.own_credentials_mfa_managers_users
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalInitProvider
2019-08-28T17:09:20.753+1000 [INFO] plugin: configuring client automatic mTLS
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: local.security_levels
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: local.security_levels
2019/08/28 17:09:20 [TRACE] vertex "local.security_levels": visit complete
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.own_credentials_mfa_managers_users
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.own_credentials_mfa_managers_users": visit complete
2019/08/28 17:09:20 [TRACE] vertex "var.target_region": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.var.target_region"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_region": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_region": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.var.target_region
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_roles (orphan)"
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_roles (orphan)": starting visit (*terraform.NodeOutputOrphan)
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.var.target_region
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_region": visit complete
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_roles (orphan)": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_roles (orphan)
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_roles (orphan)
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_roles (orphan)": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.var.read_actions
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.var.read_actions
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.read_actions": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.output.allroles
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalWriteOutput
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving value for module.kms-policies-roles.output.allroles in state
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_rolee_names (orphan)"
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_names (orphan)": starting visit (*terraform.NodeOutputOrphan)
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_names (orphan)": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_rolee_names (orphan)
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_rolee_names (orphan)
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving Create change for module.kms-policies-roles.output.allroles in changeset
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.output.allroles
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.allroles": visit complete
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_names (orphan)": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.secret_roles"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.secret_roles": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.secret_roles": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.secret_roles
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.trusted_user_accounts"
2019/08/28 17:09:20 [TRACE] vertex "var.trusted_user_accounts": starting visit (*terraform.NodeRootVariable)
2019/08/28 17:09:20 [TRACE] vertex "var.trusted_user_accounts": visit complete
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.class1_key_admin_users"
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.secret_roles
2019/08/28 17:09:20 [TRACE] vertex "var.class1_key_admin_users": starting visit (*terraform.NodeRootVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.secret_roles": visit complete
2019/08/28 17:09:20 [TRACE] vertex "var.class1_key_admin_users": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.cloudtrail-audit.var.audit_key_prefix"
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.var.audit_key_prefix": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.var.audit_key_prefix": evaluating
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.class1_key_admin_users"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.class1_key_admin_users": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.class1_key_admin_users": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.class1_key_admin_users
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.class1_key_admin_users
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.class1_key_admin_users": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.cloudtrail-audit.var.audit_key_prefix
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.cloudtrail-audit.var.audit_key_prefix
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.var.audit_key_prefix": visit complete
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_levels": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.security_levels
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.security_levels
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_levels": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.target_account"
2019/08/28 17:09:20 [TRACE] vertex "var.target_account": starting visit (*terraform.NodeRootVariable)
2019/08/28 17:09:20 [TRACE] vertex "var.target_account": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.var.target_account"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "var.assume_env_level_role_access"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_account": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "var.assume_env_level_role_access": starting visit (*terraform.NodeRootVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_account": evaluating
2019/08/28 17:09:20 [TRACE] vertex "var.assume_env_level_role_access": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.var.target_account
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.assume_env_level_role_access"
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.assume_env_level_role_access": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.write_actions": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.assume_env_level_role_access": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.assume_env_level_role_access
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.assume_env_level_role_access
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.assume_env_level_role_access": visit complete
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.var.target_account
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.target_account": visit complete
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.write_actions": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.var.write_actions
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.var.write_actions
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.var.write_actions": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.ssm_role_actions"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.ssm_role_actions": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.ssm_role_actions": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.ssm_role_actions
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] vertex "var.read_only_users": starting visit (*terraform.NodeRootVariable)
2019/08/28 17:09:20 [TRACE] vertex "var.read_only_users": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.ssm_role_actions
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.ssm_role_actions": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.read_only_users"
2019/08/28 17:09:20 [TRACE] vertex "local.security_envs": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.read_only_users": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "local.security_envs": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: local.security_envs
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: local.security_envs
2019/08/28 17:09:20 [TRACE] vertex "local.security_envs": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "local.sec_product"
2019/08/28 17:09:20 [TRACE] vertex "local.sec_product": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] vertex "local.sec_product": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: local.sec_product
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.read_only_users": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: local.sec_product
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.read_only_users
2019/08/28 17:09:20 [TRACE] vertex "local.sec_product": visit complete
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.read_only_users
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.read_only_users": visit complete
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policy_arns (orphan)": starting visit (*terraform.NodeOutputOrphan)
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policy_arns (orphan)": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_policy_arns (orphan)
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_policy_arns (orphan)
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policy_arns (orphan)": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.kms_secret_rolee_arns (orphan)"
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_arns (orphan)": starting visit (*terraform.NodeOutputOrphan)
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_arns (orphan)": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_rolee_arns (orphan)
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_rolee_arns (orphan)
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_rolee_arns (orphan)": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.security_envs"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_envs": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_envs": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.security_envs
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.security_envs
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_envs": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.security_ssm_role"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_ssm_role": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_ssm_role": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.security_ssm_role
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.security_ssm_role
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.security_ssm_role": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.sec_product"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product": evaluating
2019/08/28 17:09:20 [TRACE] vertex "provider.aws": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.sec_product
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: provider.aws
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalInitProvider
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policies (orphan)": starting visit (*terraform.NodeOutputOrphan)
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policies (orphan)": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.kms_secret_policies (orphan)
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: output.kms_secret_policies (orphan)
2019/08/28 17:09:20 [TRACE] vertex "output.kms_secret_policies (orphan)": visit complete
2019/08/28 17:09:20 [TRACE] vertex "var.admin_users": starting visit (*terraform.NodeRootVariable)
2019/08/28 17:09:20 [TRACE] vertex "var.admin_users": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.admin_users"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.admin_users": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.sec_product
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.admin_users": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.admin_users
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.local.sec_product_map"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product_map": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product_map": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.local.sec_product_map
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.admin_users
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.admin_users": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.local.sec_product_map
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.local.sec_product_map": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.output.secProdTupMap"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secProdTupMap": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secProdTupMap": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.output.secProdTupMap
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalWriteOutput
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving value for module.kms-policies-roles.output.secProdTupMap in state
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving Create change for module.kms-policies-roles.output.secProdTupMap in changeset
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.output.secProdTupMap
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secProdTupMap": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.var.env_level_role_matrix"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.env_level_role_matrix": starting visit (*terraform.NodeApplyableModuleVariable)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.env_level_role_matrix": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.var.env_level_role_matrix
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalModuleCallArgument
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSetModuleCallArguments
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.var.env_level_role_matrix
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.var.env_level_role_matrix": visit complete
2019-08-28T17:09:20.774+1000 [DEBUG] plugin: starting plugin: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 args=[/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4]
2019-08-28T17:09:20.774+1000 [DEBUG] plugin: plugin started: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4 pid=14991
2019-08-28T17:09:20.774+1000 [DEBUG] plugin: waiting for RPC address: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-local_v1.3.0_x4
2019-08-28T17:09:20.779+1000 [INFO] plugin.terraform-provider-local_v1.3.0_x4: configuring server automatic mTLS: timestamp=2019-08-28T17:09:20.779+1000
2019-08-28T17:09:20.800+1000 [DEBUG] plugin.terraform-provider-local_v1.3.0_x4: plugin address: address=/tmp/plugin991014093 network=unix timestamp=2019-08-28T17:09:20.800+1000
2019-08-28T17:09:20.800+1000 [DEBUG] plugin: using plugin: version=5
2019/08/28 17:09:20 [TRACE] BuiltinEvalContext: Initialized "local" provider for provider.local
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalValidateProvider
2019/08/28 17:09:20 [TRACE] buildProviderConfig for provider.local: no configuration at all
2019/08/28 17:09:20 [TRACE] GRPCProvider: GetSchema
2019-08-28T17:09:20.800+1000 [INFO] plugin: configuring client automatic mTLS
2019-08-28T17:09:20.824+1000 [DEBUG] plugin: starting plugin: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 args=[/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4]
2019-08-28T17:09:20.824+1000 [DEBUG] plugin: plugin started: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4 pid=15010
2019-08-28T17:09:20.824+1000 [DEBUG] plugin: waiting for RPC address: path=/home/robertk/projects/skyfii/infra-tf/aws-global/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.24.0_x4
2019-08-28T17:09:20.835+1000 [INFO] plugin.terraform-provider-aws_v2.24.0_x4: configuring server automatic mTLS: timestamp=2019-08-28T17:09:20.835+1000
2019/08/28 17:09:20 [TRACE] GRPCProvider: PrepareProviderConfig
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: provider.local
2019/08/28 17:09:20 [TRACE] vertex "provider.local": visit complete
2019-08-28T17:09:20.856+1000 [DEBUG] plugin: using plugin: version=5
2019-08-28T17:09:20.856+1000 [DEBUG] plugin.terraform-provider-aws_v2.24.0_x4: plugin address: address=/tmp/plugin640061052 network=unix timestamp=2019-08-28T17:09:20.856+1000
2019/08/28 17:09:20 [TRACE] BuiltinEvalContext: Initialized "aws" provider for provider.aws
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalValidateProvider
2019/08/28 17:09:20 [TRACE] buildProviderConfig for provider.aws: using explicit config only
2019/08/28 17:09:20 [TRACE] GRPCProvider: GetSchema
2019/08/28 17:09:20 [TRACE] GRPCProvider: PrepareProviderConfig
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] <root>: eval: terraform.EvalNoop
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: provider.aws
2019/08/28 17:09:20 [TRACE] vertex "provider.aws": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.data.aws_kms_key.io_cmk1_facts"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.io_cmk1_facts": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.io_cmk1_facts": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.data.aws_kms_key.io_cmk1_facts
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.read_only_admins"
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy"
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.secret_groups"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.secret_groups": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.aws_kms_key.io_cmk1"
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail": evaluating
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_key.io_cmk1": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.aws_iam_policy.all_secret_policy"
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.class1_kms_key_admins"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.class1_kms_key_admins": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "data.aws_caller_identity.current"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.class1_kms_key_admins": evaluating
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa"
2019/08/28 17:09:20 [TRACE] vertex "data.aws_caller_identity.current": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.class1_kms_key_admins
2019/08/28 17:09:20 [TRACE] vertex "data.aws_caller_identity.current": evaluating
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: data.aws_caller_identity.current
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group.admins"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.admins": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.admins": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.admins
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail": evaluating
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.cloudtrail-audit.aws_s3_bucket.skyfii-security-audit
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_key.io_cmk1": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.aws_kms_key.io_cmk1
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.all_secret_policy": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.all_secret_policy": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.cloudtrail-audit.aws_s3_bucket.skyfii-aws-trail
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.read_only_admins": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy": evaluating
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.assume_secret_role_policy": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.aws_iam_policy.secret_janitor_policy
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.cloudtrail-audit: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.read_only_admins": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.read_only_admins
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: data.aws_caller_identity.current
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_policy.assume_secret_role_policy
2019/08/28 17:09:20 [TRACE] vertex "data.aws_caller_identity.current": visit complete
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.aws_iam_policy.all_secret_policy
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.secret_groups": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group.secret_groups
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "local.current_account"
2019/08/28 17:09:20 [TRACE] vertex "local.current_account": starting visit (*terraform.NodeLocal)
2019/08/28 17:09:20 [TRACE] vertex "local.current_account": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: local.current_account
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_group.class1_kms_key_admins
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.class1_kms_key_admins": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership"
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.data.aws_kms_key.io_cmk1_facts
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.io_cmk1_facts": visit complete
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group_membership.class1_kms_key_admins_membership
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.cloudtrail_audit_cmk1_alias_facts": visit complete
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_io_root_alias_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_io_root_alias_key_id"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_arn": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_key_id": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_arn": evaluating
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_io_root_cmk1_state"
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_io_root_alias_arn
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_cmk1_state": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_key_id": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_cmk1_state": evaluating
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_io_root_cmk1_state
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_io_root_alias_key_id
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.own_credentials_mfa_managers": visit complete
2019/08/28 17:09:20 [TRACE] vertex "module.cloudtrail-audit.aws_s3_bucket_policy.skyfii-aws-trail": visit complete
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group_membership.own_credentials_mfa_managers_membership
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateDataSourceConfig
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.aws_iam_policy.secret_janitor_policy
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.secret_janitor_policy": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_policy.self_managed_credentials_mfa": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.output.secret_janitor_policy"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secret_janitor_policy": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.aws_kms_key.io_cmk1
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secret_janitor_policy": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_key.io_cmk1": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.output.secret_janitor_policy
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_group.admins
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.aws_kms_alias.io_cmk1_alias"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_alias.io_cmk1_alias": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.aws_kms_alias.io_cmk1_alias": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.aws_kms_alias.io_cmk1_alias
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_policy_attachment.self_managed_credentials_mfa_attachement"
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_policy.assume_secret_role_policy
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalWriteOutput
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.admins": visit complete
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] <root>: eval: *terraform.EvalLocal
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-policies-roles.data.aws_iam_policy.secret_janitor_policy_facts
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_key.cloudtrail_audit_cmk1_facts": visit complete
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_cloudtrail_arn"
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.iam-user-roles.aws_iam_group_membership.admin_group_membership"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.admin_group_membership": starting visit (*terraform.NodeValidatableResource)
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_cloudtrail_state"
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group_membership.admin_group_membership": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_state": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.iam-user-roles.aws_iam_group_membership.admin_group_membership
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "module.kms-keys.output.aws_kms_cloudtrail_key_id"
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_state": evaluating
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_key_id": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_key_id": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: local.current_account
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_cloudtrail_key_id
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_cloudtrail_arn": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalWriteOutput
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.data.aws_kms_alias.io_cmk1_alias_facts": visit complete
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Removing module.kms-keys.output.aws_kms_io_root_alias_key_id from state (it is now null)
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving Create change for module.kms-keys.output.aws_kms_io_root_alias_key_id in changeset
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-keys.output.aws_kms_io_root_alias_key_id
2019/08/28 17:09:20 [TRACE] vertex "module.kms-keys.output.aws_kms_io_root_alias_key_id": visit complete
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalOpFilter
2019/08/28 17:09:20 [TRACE] dag/walk: visiting "output.root_key_key_id"
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalWriteOutput
2019/08/28 17:09:20 [TRACE] module.iam-user-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] vertex "output.root_key_key_id": starting visit (*terraform.NodeApplyableOutput)
2019/08/28 17:09:20 [TRACE] vertex "output.root_key_key_id": evaluating
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: output.root_key_key_id
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Removing module.kms-policies-roles.output.secret_janitor_policy from state (it is now null)
2019/08/28 17:09:20 [TRACE] [walkValidate] Entering eval tree: module.kms-keys.output.aws_kms_cloudtrail_state
2019/08/28 17:09:20 [TRACE] EvalWriteOutput: Saving Create change for module.kms-policies-roles.output.secret_janitor_policy in changeset
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.kms-policies-roles.output.secret_janitor_policy
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.output.secret_janitor_policy": visit complete
2019/08/28 17:09:20 [TRACE] module.kms-policies-roles: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalSequence
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalGetProvider
2019/08/28 17:09:20 [TRACE] module.kms-keys: eval: *terraform.EvalValidateResource
2019/08/28 17:09:20 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2019/08/28 17:09:20 [TRACE] vertex "module.kms-policies-roles.aws_iam_policy.all_secret_policy": visit complete
2019/08/28 17:09:20 [TRACE] [walkValidate] Exiting eval tree: module.iam-user-roles.aws_iam_group.read_only_admins
2019/08/28 17:09:20 [TRACE] vertex "module.iam-user-roles.aws_iam_group.read_only_admins": visit complete
panic: not a string
goroutine 402 [running]:
github.com/zclconf/go-cty/cty.Value.AsString(...)
/opt/teamcity-agent/work/9e329aa031982669/pkg/mod/github.com/zclconf/go-cty@v1.0.1-0.20190708163926-19588f92a98f/cty/value_ops.go:1026
github.com/zclconf/go-cty/cty.Value.AsValueMap(0x2228cc0, 0xc0006f5c60, 0x19cd420, 0xc0006f5c80, 0x2)
/opt/teamcity-agent/work/9e329aa031982669/pkg/mod/github.com/zclconf/go-cty@v1.0.1-0.20190708163926-19588f92a98f/cty/value_ops.go:1095 +0x38a
github.com/hashicorp/terraform/terraform.evaluateResourceForEachExpressionKnown(0x7f3e4ffd3638, 0xc000528fa0, 0x225a540, 0xc0005cc000, 0x727464756f6c632e, 0x696475615f6c6961, 0x665f316b6d635f74, 0x40b849, 0xc000b9d6b8)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval_for_each.go:84 +0x5bd
github.com/hashicorp/terraform/terraform.(*EvalValidateResource).validateForEach(0xc0014dc190, 0x225a540, 0xc0005cc000, 0x7f3e4ffd3638, 0xc000528fa0, 0x0, 0x6f6d20200a747570, 0x736d6b2e656c7564)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval_validate.go:572 +0x59
github.com/hashicorp/terraform/terraform.(*EvalValidateResource).Eval(0xc0014dc190, 0x225a540, 0xc0005cc000, 0x2, 0x2, 0x0, 0x0)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval_validate.go:394 +0x1b57
github.com/hashicorp/terraform/terraform.EvalRaw(0x21e7340, 0xc0014dc190, 0x225a540, 0xc0005cc000, 0x0, 0x0, 0x0, 0x0)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval.go:57 +0x131
github.com/hashicorp/terraform/terraform.(*EvalSequence).Eval(0xc00013c080, 0x225a540, 0xc0005cc000, 0x2, 0x2, 0xed4375, 0x21e7340)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval_sequence.go:20 +0xfd
github.com/hashicorp/terraform/terraform.EvalRaw(0x21e72a0, 0xc00013c080, 0x225a540, 0xc0005cc000, 0x1a840c0, 0x3200165, 0x19f0bc0, 0xc000fe22e0)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval.go:57 +0x131
github.com/hashicorp/terraform/terraform.Eval(0x21e72a0, 0xc00013c080, 0x225a540, 0xc0005cc000, 0xc00013c080, 0x21e72a0, 0xc00013c080, 0x0)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/eval.go:35 +0x4d
github.com/hashicorp/terraform/terraform.(*Graph).walk.func1(0x1ce36e0, 0xc000424480, 0x0, 0x0, 0x0)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/terraform/graph.go:90 +0xf40
github.com/hashicorp/terraform/dag.(*Walker).walkVertex(0xc0004f2080, 0x1ce36e0, 0xc000424480, 0xc000a572c0)
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/dag/walk.go:392 +0x353
created by github.com/hashicorp/terraform/dag.(*Walker).Update
/opt/teamcity-agent/work/9e329aa031982669/src/github.com/hashicorp/terraform/dag/walk.go:314 +0xa9b
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment