Skip to content

Instantly share code, notes, and snippets.

@sblask
Created April 15, 2021 08:24
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save sblask/6e24b1b5489f39fc96b181f98282804b to your computer and use it in GitHub Desktop.
Save sblask/6e24b1b5489f39fc96b181f98282804b to your computer and use it in GitHub Desktop.
~/Clones/sandpit $ TF_LOG=TRACE terraform_0_15_0 plan -out plan
2021-04-15T20:18:05.888+1200 [DEBUG] Adding temp file log sink: /var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/terraform-log369535931
2021-04-15T20:18:05.888+1200 [INFO] Terraform version: 0.15.0
2021-04-15T20:18:05.888+1200 [INFO] Go runtime version: go1.16.2
2021-04-15T20:18:05.888+1200 [INFO] CLI args: []string{"/Users/sebastian/.bin/terraform_0_15_0", "plan", "-out", "plan"}
2021-04-15T20:18:05.889+1200 [TRACE] Stdout is a terminal of width 137
2021-04-15T20:18:05.889+1200 [TRACE] Stderr is a terminal of width 137
2021-04-15T20:18:05.889+1200 [TRACE] Stdin is a terminal
2021-04-15T20:18:05.889+1200 [DEBUG] Attempting to open CLI config file: /Users/sebastian/.terraformrc
2021-04-15T20:18:05.889+1200 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2021-04-15T20:18:05.889+1200 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins
2021-04-15T20:18:05.889+1200 [DEBUG] ignoring non-existing provider search directory /Users/sebastian/.terraform.d/plugins
2021-04-15T20:18:05.889+1200 [DEBUG] ignoring non-existing provider search directory /Users/sebastian/Library/Application Support/io.terraform/plugins
2021-04-15T20:18:05.889+1200 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins
2021-04-15T20:18:05.889+1200 [INFO] CLI command args: []string{"plan", "-out", "plan"}
2021-04-15T20:18:05.890+1200 [TRACE] Meta.Backend: no config given or present on disk, so returning nil config
2021-04-15T20:18:05.890+1200 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory
2021-04-15T20:18:05.890+1200 [DEBUG] New state was assigned lineage "71961561-cd2b-b0be-42e4-c2b80aed491a"
2021-04-15T20:18:05.890+1200 [TRACE] Meta.Backend: using default local state only (no backend configuration, and no existing initialized backend)
2021-04-15T20:18:05.890+1200 [TRACE] Meta.Backend: instantiated backend of type <nil>
2021-04-15T20:18:05.891+1200 [TRACE] providercache.fillMetaCache: scanning directory .terraform/providers
2021-04-15T20:18:05.891+1200 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/aws v3.36.0 for darwin_amd64 at .terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64
2021-04-15T20:18:05.891+1200 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64 as a candidate package for registry.terraform.io/hashicorp/aws 3.36.0
2021-04-15T20:18:06.356+1200 [DEBUG] checking for provisioner in "."
2021-04-15T20:18:06.357+1200 [DEBUG] checking for provisioner in "/Users/sebastian/.bin"
2021-04-15T20:18:06.357+1200 [INFO] Failed to read plugin lock file .terraform/plugins/darwin_amd64/lock.json: open .terraform/plugins/darwin_amd64/lock.json: no such file or directory
2021-04-15T20:18:06.357+1200 [TRACE] Meta.Backend: backend <nil> does not support operations, so wrapping it in a local backend
2021-04-15T20:18:06.357+1200 [INFO] backend/local: starting Plan operation
2021-04-15T20:18:06.358+1200 [TRACE] backend/local: requesting state manager for workspace "default"
2021-04-15T20:18:06.358+1200 [TRACE] backend/local: state manager for workspace "default" will:
- read initial snapshot from terraform.tfstate
- write new snapshots to terraform.tfstate
- create any backup at terraform.tfstate.backup
2021-04-15T20:18:06.358+1200 [TRACE] backend/local: requesting state lock for workspace "default"
2021-04-15T20:18:06.358+1200 [TRACE] statemgr.Filesystem: preparing to manage state snapshots at terraform.tfstate
2021-04-15T20:18:06.358+1200 [TRACE] statemgr.Filesystem: existing snapshot has lineage "6203beae-7a1c-f608-695f-d7ec1e7239a8" serial 18
2021-04-15T20:18:06.358+1200 [TRACE] statemgr.Filesystem: locking terraform.tfstate using fcntl flock
2021-04-15T20:18:06.358+1200 [TRACE] statemgr.Filesystem: writing lock metadata to .terraform.tfstate.lock.info
2021-04-15T20:18:06.359+1200 [TRACE] backend/local: reading remote state for workspace "default"
2021-04-15T20:18:06.359+1200 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate
2021-04-15T20:18:06.359+1200 [TRACE] statemgr.Filesystem: read snapshot with lineage "6203beae-7a1c-f608-695f-d7ec1e7239a8" serial 18
2021-04-15T20:18:06.359+1200 [TRACE] backend/local: retrieving local state snapshot for workspace "default"
2021-04-15T20:18:06.359+1200 [TRACE] backend/local: building context for current working directory
2021-04-15T20:18:06.360+1200 [TRACE] terraform.NewContext: starting
2021-04-15T20:18:06.360+1200 [TRACE] terraform.NewContext: loading provider schemas
2021-04-15T20:18:06.360+1200 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/aws"
2021-04-15T20:18:06.360+1200 [DEBUG] created provider logger: level=trace
2021-04-15T20:18:06.360+1200 [INFO] provider: configuring client automatic mTLS
2021-04-15T20:18:06.390+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5]
2021-04-15T20:18:06.399+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55774
2021-04-15T20:18:06.399+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5
2021-04-15T20:18:06.441+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T20:18:06.441+1200
2021-04-15T20:18:06.476+1200 [DEBUG] provider: using plugin: version=5
2021-04-15T20:18:06.476+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin796884205 network=unix timestamp=2021-04-15T20:18:06.476+1200
2021-04-15T20:18:06.518+1200 [TRACE] GRPCProvider: GetProviderSchema
2021-04-15T20:18:06.518+1200 [TRACE] provider.stdio: waiting for stdio data
2021-04-15T20:18:06.588+1200 [TRACE] GRPCProvider: Close
2021-04-15T20:18:06.589+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-04-15T20:18:06.593+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55774
2021-04-15T20:18:06.593+1200 [DEBUG] provider: plugin exited
2021-04-15T20:18:06.593+1200 [TRACE] terraform.NewContext: complete
2021-04-15T20:18:06.593+1200 [TRACE] backend/local: finished building terraform.Context
2021-04-15T20:18:06.593+1200 [TRACE] backend/local: requesting interactive input, if necessary
2021-04-15T20:18:06.593+1200 [TRACE] Context.Input: Prompting for provider arguments
2021-04-15T20:18:06.594+1200 [TRACE] Context.Input: Provider provider.aws declared at main.tf:3,1-15
2021-04-15T20:18:06.594+1200 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{}
2021-04-15T20:18:06.594+1200 [TRACE] backend/local: running validation operation
2021-04-15T20:18:06.594+1200 [INFO] terraform: building graph: GraphTypeValidate
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021-04-15T20:18:06.594+1200 [TRACE] ConfigTransformer: Starting for path:
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
------
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.LocalTransformer
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
------
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.OutputTransformer
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.StateTransformer
2021-04-15T20:18:06.594+1200 [TRACE] StateTransformer: state is empty, so nothing to do
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.test" (*terraform.NodeValidatableResource) config from main.tf:60,1-49
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.test
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.instance" (*terraform.NodeValidatableResource) config from main.tf:29,1-35
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.instance
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.assume_test" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:18, Column:1, Byte:187}, End:hcl.Pos{Line:18, Column:45, Byte:231}}
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.assume_test
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.test" (*terraform.NodeValidatableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:36, Column:1, Byte:584}, End:hcl.Pos{Line:36, Column:38, Byte:621}}
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.test
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.test" (*terraform.NodeValidatableResource) config from main.tf:46,1-33
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.test
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.test" (*terraform.NodeValidatableResource) config from main.tf:53,1-31
2021-04-15T20:18:06.594+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.test
2021-04-15T20:18:06.594+1200 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021-04-15T20:18:06.594+1200 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from main.tf:3,1-15
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021-04-15T20:18:06.594+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021-04-15T20:18:06.594+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.assume_test
2021-04-15T20:18:06.594+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.assume_test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.594+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.test
2021-04-15T20:18:06.594+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.594+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.test
2021-04-15T20:18:06.594+1200 [DEBUG] ProviderTransformer: "aws_iam_policy.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.594+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.test
2021-04-15T20:18:06.594+1200 [DEBUG] ProviderTransformer: "aws_iam_role.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.596+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.test
2021-04-15T20:18:06.596+1200 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.test" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.596+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.instance
2021-04-15T20:18:06.596+1200 [DEBUG] ProviderTransformer: "aws_iam_role.instance" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.596+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.596+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021-04-15T20:18:06.596+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021-04-15T20:18:06.596+1200 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.596+1200 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021-04-15T20:18:06.596+1200 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021-04-15T20:18:06.596+1200 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.test
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.test
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.test
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.instance
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.assume_test
2021-04-15T20:18:06.596+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.test
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes)
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: []
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test" references: [local.users (expand) data.aws_iam_policy_document.test]
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test" references: [local.users (expand) data.aws_iam_policy_document.assume_test]
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test" references: [local.users (expand) aws_iam_policy.test aws_iam_role.test]
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance" references: [local.users (expand) data.aws_iam_policy_document.assume_test]
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_test" references: []
2021-04-15T20:18:06.597+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test" references: [local.users (expand) aws_iam_role.instance]
2021-04-15T20:18:06.597+1200 [DEBUG] ReferenceTransformer: "local.users (expand)" references: []
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.attachDataResourceDependsOnTransformer
2021-04-15T20:18:06.597+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.assume_test depends on []
2021-04-15T20:18:06.597+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.test depends on [aws_iam_role.instance data.aws_iam_policy_document.assume_test]
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.attachDataResourceDependsOnTransformer (no changes)
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021-04-15T20:18:06.597+1200 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021-04-15T20:18:06.597+1200 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021-04-15T20:18:06.598+1200 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.598+1200 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021-04-15T20:18:06.598+1200 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.598+1200 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer
2021-04-15T20:18:06.598+1200 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
------
2021-04-15T20:18:06.598+1200 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021-04-15T20:18:06.598+1200 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
aws_iam_policy.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
aws_iam_role.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
aws_iam_policy.test - *terraform.NodeValidatableResource
aws_iam_role.test - *terraform.NodeValidatableResource
data.aws_iam_policy_document.assume_test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test - *terraform.NodeValidatableResource
aws_iam_role.instance - *terraform.NodeValidatableResource
local.users (expand) - *terraform.nodeExpandLocal
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_role_policy_attachment.test - *terraform.NodeValidatableResource
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
------
2021-04-15T20:18:06.598+1200 [DEBUG] Starting graph walk: walkValidate
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": starting visit (*terraform.nodeExpandLocal)
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": expanding dynamic subgraph
2021-04-15T20:18:06.598+1200 [TRACE] Expanding local: adding local.users as *terraform.NodeLocal
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": entering dynamic subgraph
2021-04-15T20:18:06.598+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider)
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users": starting visit (*terraform.NodeLocal)
2021-04-15T20:18:06.598+1200 [DEBUG] created provider logger: level=trace
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users": visit complete
2021-04-15T20:18:06.598+1200 [INFO] provider: configuring client automatic mTLS
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": dynamic subgraph completed successfully
2021-04-15T20:18:06.598+1200 [TRACE] vertex "local.users (expand)": visit complete
2021-04-15T20:18:06.629+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5]
2021-04-15T20:18:06.642+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55775
2021-04-15T20:18:06.642+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5
2021-04-15T20:18:06.687+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T20:18:06.687+1200
2021-04-15T20:18:06.723+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin643751042 network=unix timestamp=2021-04-15T20:18:06.723+1200
2021-04-15T20:18:06.723+1200 [DEBUG] provider: using plugin: version=5
2021-04-15T20:18:06.765+1200 [TRACE] provider.stdio: waiting for stdio data
2021-04-15T20:18:06.765+1200 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.766+1200 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only
2021-04-15T20:18:06.766+1200 [TRACE] GRPCProvider: GetProviderSchema
2021-04-15T20:18:06.830+1200 [TRACE] GRPCProvider: ValidateProviderConfig
2021-04-15T20:18:06.894+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete
2021-04-15T20:18:06.895+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": starting visit (*terraform.NodeValidatableResource)
2021-04-15T20:18:06.895+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig
2021-04-15T20:18:06.895+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:06 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:06.895+1200
2021-04-15T20:18:06.895+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:06 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:06.895+1200
2021-04-15T20:18:06.895+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:06 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:06.895+1200
2021-04-15T20:18:06.895+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": visit complete
2021-04-15T20:18:06.895+1200 [TRACE] vertex "aws_iam_role.test": starting visit (*terraform.NodeValidatableResource)
2021-04-15T20:18:06.895+1200 [TRACE] vertex "aws_iam_role.instance": starting visit (*terraform.NodeValidatableResource)
2021-04-15T20:18:06.896+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:06.896+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:06.896+1200 [TRACE] vertex "aws_iam_role.test": visit complete
2021-04-15T20:18:06.896+1200 [TRACE] vertex "aws_iam_role.instance": visit complete
2021-04-15T20:18:06.896+1200 [TRACE] vertex "data.aws_iam_policy_document.test": starting visit (*terraform.NodeValidatableResource)
2021-04-15T20:18:06.896+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig
2021-04-15T20:18:06.897+1200 [TRACE] vertex "data.aws_iam_policy_document.test": visit complete
2021-04-15T20:18:06.897+1200 [TRACE] vertex "aws_iam_policy.test": starting visit (*terraform.NodeValidatableResource)
2021-04-15T20:18:06.897+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:06.897+1200 [TRACE] vertex "aws_iam_policy.test": visit complete
2021-04-15T20:18:06.897+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": starting visit (*terraform.NodeValidatableResource)
2021-04-15T20:18:06.897+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:06.898+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": visit complete
2021-04-15T20:18:06.898+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021-04-15T20:18:06.898+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-04-15T20:18:06.898+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider)
2021-04-15T20:18:06.898+1200 [TRACE] GRPCProvider: Close
2021-04-15T20:18:06.898+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-04-15T20:18:06.901+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55775
2021-04-15T20:18:06.901+1200 [DEBUG] provider: plugin exited
2021-04-15T20:18:06.901+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete
2021-04-15T20:18:06.901+1200 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule)
2021-04-15T20:18:06.901+1200 [TRACE] vertex "root": visit complete
2021-04-15T20:18:06.901+1200 [INFO] backend/local: plan calling Plan
2021-04-15T20:18:06.901+1200 [INFO] terraform: building graph: GraphTypePlan
2021-04-15T20:18:06.901+1200 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021-04-15T20:18:06.901+1200 [TRACE] ConfigTransformer: Starting for path:
2021-04-15T20:18:06.901+1200 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
------
2021-04-15T20:18:06.901+1200 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021-04-15T20:18:06.901+1200 [TRACE] Completed graph transform *terraform.RootVariableTransformer (no changes)
2021-04-15T20:18:06.901+1200 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021-04-15T20:18:06.901+1200 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021-04-15T20:18:06.901+1200 [TRACE] Executing graph transform *terraform.LocalTransformer
2021-04-15T20:18:06.901+1200 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
------
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.OutputTransformer
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.OutputTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.StateTransformer
2021-04-15T20:18:06.902+1200 [TRACE] StateTransformer: creating nodes for deposed instance objects only
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.instance (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:29,1-35
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.instance (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.test (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:46,1-33
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.assume_test (expand)" (*terraform.nodeExpandPlannableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:18, Column:1, Byte:187}, End:hcl.Pos{Line:18, Column:45, Byte:231}}
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.assume_test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "data.aws_iam_policy_document.test (expand)" (*terraform.nodeExpandPlannableResource) config from hcl.Range{Filename:"main.tf", Start:hcl.Pos{Line:36, Column:1, Byte:584}, End:hcl.Pos{Line:36, Column:38, Byte:621}}
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to data.aws_iam_policy_document.test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.test (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:53,1-31
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.test (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:60,1-49
2021-04-15T20:18:06.902+1200 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021-04-15T20:18:06.902+1200 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from main.tf:3,1-15
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.test (expand)
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "aws_iam_role.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.test (expand)
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.instance (expand)
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "aws_iam_role.instance (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.test (expand)
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "aws_iam_policy.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.assume_test (expand)
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.assume_test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.902+1200 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving data.aws_iam_policy_document.test (expand)
2021-04-15T20:18:06.902+1200 [DEBUG] ProviderTransformer: "data.aws_iam_policy_document.test (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021-04-15T20:18:06.902+1200 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.instance (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.assume_test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] AttachSchemaTransformer: attaching resource schema to data.aws_iam_policy_document.test (expand)
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer
2021-04-15T20:18:06.902+1200 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes)
2021-04-15T20:18:06.902+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021-04-15T20:18:06.902+1200 [DEBUG] ReferenceTransformer: "local.users (expand)" references: []
2021-04-15T20:18:06.902+1200 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: []
2021-04-15T20:18:06.902+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.902+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test (expand)" references: [local.users (expand) data.aws_iam_policy_document.assume_test (expand)]
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test (expand)" references: [local.users (expand) aws_iam_policy.test (expand) aws_iam_role.test (expand)]
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance (expand)" references: [local.users (expand) data.aws_iam_policy_document.assume_test (expand)]
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test (expand)" references: [local.users (expand) data.aws_iam_policy_document.test (expand)]
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_test (expand)" references: []
2021-04-15T20:18:06.903+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:06.903+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test (expand)" references: [local.users (expand) aws_iam_role.instance (expand)]
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: data.aws_iam_policy_document.assume_test depends on []
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: data.aws_iam_policy_document.test depends on [aws_iam_role.instance data.aws_iam_policy_document.assume_test]
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: aws_iam_role.test depends on [data.aws_iam_policy_document.assume_test]
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: aws_iam_role_policy_attachment.test depends on [aws_iam_policy.test aws_iam_role.instance aws_iam_role.test data.aws_iam_policy_document.assume_test data.aws_iam_policy_document.test]
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: aws_iam_role.instance depends on [data.aws_iam_policy_document.assume_test]
2021-04-15T20:18:06.903+1200 [TRACE] AttachDependenciesTransformer: aws_iam_policy.test depends on [aws_iam_role.instance data.aws_iam_policy_document.assume_test data.aws_iam_policy_document.test]
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.attachDataResourceDependsOnTransformer
2021-04-15T20:18:06.903+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.assume_test depends on []
2021-04-15T20:18:06.903+1200 [TRACE] attachDataDependenciesTransformer: data.aws_iam_policy_document.test depends on [aws_iam_role.instance data.aws_iam_policy_document.assume_test]
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.attachDataResourceDependsOnTransformer (no changes)
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "aws_iam_role.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "aws_iam_role_policy_attachment.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "aws_iam_role.instance (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "aws_iam_policy.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "data.aws_iam_policy_document.assume_test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021-04-15T20:18:06.903+1200 [TRACE] ForcedCBDTransformer: "data.aws_iam_policy_document.test (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
------
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer
2021-04-15T20:18:06.903+1200 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.users (expand) - *terraform.nodeExpandLocal
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
------
2021-04-15T20:18:06.903+1200 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021-04-15T20:18:06.904+1200 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_policy.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.test (expand) - *terraform.nodeExpandPlannableResource
data.aws_iam_policy_document.assume_test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
data.aws_iam_policy_document.test (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.instance (expand) - *terraform.nodeExpandPlannableResource
local.users (expand) - *terraform.nodeExpandLocal
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_role_policy_attachment.test (expand) - *terraform.nodeExpandPlannableResource
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
------
2021-04-15T20:18:06.904+1200 [DEBUG] Starting graph walk: walkPlan
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": starting visit (*terraform.nodeExpandLocal)
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": expanding dynamic subgraph
2021-04-15T20:18:06.904+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider)
2021-04-15T20:18:06.904+1200 [TRACE] Expanding local: adding local.users as *terraform.NodeLocal
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": entering dynamic subgraph
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users": starting visit (*terraform.NodeLocal)
2021-04-15T20:18:06.904+1200 [DEBUG] created provider logger: level=trace
2021-04-15T20:18:06.904+1200 [INFO] provider: configuring client automatic mTLS
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users": visit complete
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": dynamic subgraph completed successfully
2021-04-15T20:18:06.904+1200 [TRACE] vertex "local.users (expand)": visit complete
2021-04-15T20:18:06.932+1200 [DEBUG] provider: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5]
2021-04-15T20:18:06.944+1200 [DEBUG] provider: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55776
2021-04-15T20:18:06.944+1200 [DEBUG] provider: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5
2021-04-15T20:18:06.987+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: configuring server automatic mTLS: timestamp=2021-04-15T20:18:06.987+1200
2021-04-15T20:18:07.025+1200 [DEBUG] provider: using plugin: version=5
2021-04-15T20:18:07.025+1200 [DEBUG] provider.terraform-provider-aws_v3.36.0_x5: plugin address: address=/var/folders/qy/wfckskrd51l41bfk_ddbx9f40000gn/T/plugin044736751 network=unix timestamp=2021-04-15T20:18:07.025+1200
2021-04-15T20:18:07.067+1200 [TRACE] provider.stdio: waiting for stdio data
2021-04-15T20:18:07.067+1200 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"]
2021-04-15T20:18:07.067+1200 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only
2021-04-15T20:18:07.067+1200 [TRACE] GRPCProvider: GetProviderSchema
2021-04-15T20:18:07.135+1200 [TRACE] GRPCProvider: ValidateProviderConfig
2021-04-15T20:18:07.199+1200 [WARN] ValidateProviderConfig from "provider[\"registry.terraform.io/hashicorp/aws\"]" changed the config value, but that value is unused
2021-04-15T20:18:07.199+1200 [TRACE] GRPCProvider: ConfigureProvider
2021-04-15T20:18:07.200+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:07 [INFO] assume_role configuration set: (ARN: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/terraform-admin", SessionID: "", ExternalID: ""): timestamp=2021-04-15T20:18:07.200+1200
2021-04-15T20:18:07.200+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:07 [INFO] AWS Auth provider used: "EnvProvider": timestamp=2021-04-15T20:18:07.200+1200
2021-04-15T20:18:07.200+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:07 [INFO] Attempting to AssumeRole arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/terraform-admin (SessionName: "", ExternalId: ""): timestamp=2021-04-15T20:18:07.200+1200
2021-04-15T20:18:07.200+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:07 [DEBUG] [aws-sdk-go] DEBUG: Request sts/AssumeRole Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: sts.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64)
Content-Length: 159
Authorization: AWS4-HMAC-SHA256 Credential=ASIAS6L2E357XNKKD4WM/20210415/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=8f1e1ab4caab9f987f894cc68113e4c7be2be9100765d4ea96a59d8f1b1772cd
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081807Z
X-Amz-Security-Token: FwoGZXIvYXdzELH//////////wEaDDhYBKvUmG0Ba28LvyKGATvVQBWhqQFd8ebeXrEsDimzLl5lZIE1UhRrrioV+e6xZ4pI3QEv95mwz81YoZR6UfzzOy/NgNdKA8ur744gPPlEDXhrojqPdOf8qna4FVsWbWnNtMORw2bDpJpu8WkMffk/nHUnjVWDhomtZmNCmRhsQr8n8axEIRLYoaPXoaJaPGGsafiGKJXs3YMGMii9LOq5CCJ7jOKSyfF2nSlL9ohStopd4T9YL3IUCDqF5pLAzz/QJp1r
Accept-Encoding: gzip
Action=AssumeRole&DurationSeconds=900&RoleArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Arole%2Fterraform-admin&RoleSessionName=1618474687200630000&Version=2011-06-15
-----------------------------------------------------: timestamp=2021-04-15T20:18:07.200+1200
2021-04-15T20:18:08.466+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:08 [DEBUG] [aws-sdk-go] DEBUG: Response sts/AssumeRole Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 1092
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:08 GMT
X-Amzn-Requestid: 79c198b2-be4e-4004-9f54-9b3583ce78a3
-----------------------------------------------------: timestamp=2021-04-15T20:18:08.466+1200
2021-04-15T20:18:08.466+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:08 [DEBUG] [aws-sdk-go] <AssumeRoleResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
<AssumeRoleResult>
<AssumedRoleUser>
<AssumedRoleId>AROARF4HWBBNRYHWWXHE5:1618474687200630000</AssumedRoleId>
<Arn>arn:aws:sts::XXXXXXXXXXXXXXXXXXXXX:assumed-role/terraform-admin/1618474687200630000</Arn>
</AssumedRoleUser>
<Credentials>
<AccessKeyId>ASIARF4HWBBNUEFPMRXA</AccessKeyId>
<SecretAccessKey>fQOe29Fw/q4Ad4PXGyW0iBunFM5V1+8jKv/yOAmR</SecretAccessKey>
<SessionToken>FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==</SessionToken>
<Expiration>2021-04-15T08:33:08Z</Expiration>
</Credentials>
</AssumeRoleResult>
<ResponseMetadata>
<RequestId>79c198b2-be4e-4004-9f54-9b3583ce78a3</RequestId>
</ResponseMetadata>
</AssumeRoleResponse>: timestamp=2021-04-15T20:18:08.466+1200
2021-04-15T20:18:08.468+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:08 [DEBUG] Trying to get account information via sts:GetCallerIdentity: timestamp=2021-04-15T20:18:08.468+1200
2021-04-15T20:18:08.468+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:08 [DEBUG] [aws-sdk-go] DEBUG: Request sts/GetCallerIdentity Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: sts.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 43
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/sts/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=a2fa7b4b63b37bcbd884273b9cc0738c8f08468053eeb7a403d051556cd28edb
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081808Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetCallerIdentity&Version=2011-06-15
-----------------------------------------------------: timestamp=2021-04-15T20:18:08.468+1200
2021-04-15T20:18:09.344+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Response sts/GetCallerIdentity Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 460
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:08 GMT
X-Amzn-Requestid: ac851143-513a-461a-9d03-a553eeb7e14b
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.344+1200
2021-04-15T20:18:09.344+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/">
<GetCallerIdentityResult>
<Arn>arn:aws:sts::XXXXXXXXXXXXXXXXXXXXX:assumed-role/terraform-admin/1618474687200630000</Arn>
<UserId>AROARF4HWBBNRYHWWXHE5:1618474687200630000</UserId>
<Account>XXXXXXXXXXXXXXXXXXXXX</Account>
</GetCallerIdentityResult>
<ResponseMetadata>
<RequestId>ac851143-513a-461a-9d03-a553eeb7e14b</RequestId>
</ResponseMetadata>
</GetCallerIdentityResponse>: timestamp=2021-04-15T20:18:09.344+1200
2021-04-15T20:18:09.350+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request ec2/DescribeAccountAttributes Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: ec2.ap-southeast-2.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 87
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/ap-southeast-2/ec2/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=03dc098aa59edde989f2db66bf31cdabc13da562899cac44c41c97e21bd36968
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081809Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=DescribeAccountAttributes&AttributeName.1=supported-platforms&Version=2016-11-15
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.350+1200
2021-04-15T20:18:09.689+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Response ec2/DescribeAccountAttributes Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 540
Cache-Control: no-cache, no-store
Content-Type: text/xml;charset=UTF-8
Date: Thu, 15 Apr 2021 08:18:09 GMT
Server: AmazonEC2
Strict-Transport-Security: max-age=31536000; includeSubDomains
X-Amzn-Requestid: d88bb04f-a8a9-4a7a-b0aa-1cf83fd670a1
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.689+1200
2021-04-15T20:18:09.689+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?>
<DescribeAccountAttributesResponse xmlns="http://ec2.amazonaws.com/doc/2016-11-15/">
<requestId>d88bb04f-a8a9-4a7a-b0aa-1cf83fd670a1</requestId>
<accountAttributeSet>
<item>
<attributeName>supported-platforms</attributeName>
<attributeValueSet>
<item>
<attributeValue>VPC</attributeValue>
</item>
</attributeValueSet>
</item>
</accountAttributeSet>
</DescribeAccountAttributesResponse>: timestamp=2021-04-15T20:18:09.689+1200
2021-04-15T20:18:09.689+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": expanding dynamic subgraph
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": entering dynamic subgraph
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": starting visit (*terraform.NodePlannableResource)
2021-04-15T20:18:09.689+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": expanding dynamic subgraph
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021-04-15T20:18:09.690+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.assume_test as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
data.aws_iam_policy_document.assume_test - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021-04-15T20:18:09.690+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.assume_test" references: []
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021-04-15T20:18:09.690+1200 [TRACE] Executing graph transform *terraform.RootTransformer
2021-04-15T20:18:09.690+1200 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021-04-15T20:18:09.690+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": entering dynamic subgraph
2021-04-15T20:18:09.690+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:09.690+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.assume_test
2021-04-15T20:18:09.691+1200 [TRACE] readDataSource: Re-validating config for data.aws_iam_policy_document.assume_test
2021-04-15T20:18:09.691+1200 [TRACE] GRPCProvider: ValidateDataResourceConfig
2021-04-15T20:18:09.692+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:09.692+1200
2021-04-15T20:18:09.692+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:09.692+1200
2021-04-15T20:18:09.692+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-04-15T20:18:09.692+1200
2021-04-15T20:18:09.692+1200 [TRACE] readDataSource: data.aws_iam_policy_document.assume_test configuration is complete, so reading from provider
2021-04-15T20:18:09.692+1200 [TRACE] GRPCProvider: ReadDataSource
2021-04-15T20:18:09.694+1200 [WARN] Provider "provider[\"registry.terraform.io/hashicorp/aws\"]" produced an unexpected new value for data.aws_iam_policy_document.assume_test.
- .version: was null, but now cty.StringVal("2012-10-17")
- .statement[0].effect: was null, but now cty.StringVal("Allow")
- .statement[0].not_actions: was null, but now cty.SetValEmpty(cty.String)
- .statement[0].not_resources: was null, but now cty.SetValEmpty(cty.String)
- .statement[0].resources: was null, but now cty.SetValEmpty(cty.String)
- .statement[0].sid: was null, but now cty.StringVal("")
2021-04-15T20:18:09.694+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.assume_test
2021-04-15T20:18:09.694+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.assume_test
2021-04-15T20:18:09.694+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.assume_test
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": visit complete
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": dynamic subgraph completed successfully
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test": visit complete
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": dynamic subgraph completed successfully
2021-04-15T20:18:09.694+1200 [TRACE] vertex "data.aws_iam_policy_document.assume_test (expand)": visit complete
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.instance (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.test (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.test (expand)": expanding dynamic subgraph
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.instance (expand)": expanding dynamic subgraph
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.instance (expand)": entering dynamic subgraph
2021-04-15T20:18:09.694+1200 [TRACE] vertex "aws_iam_role.test (expand)": entering dynamic subgraph
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance": starting visit (*terraform.NodePlannableResource)
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.test": starting visit (*terraform.NodePlannableResource)
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance": expanding dynamic subgraph
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021-04-15T20:18:09.695+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.instance["bar"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:09.695+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.instance["baz"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:09.695+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.instance["foo"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
aws_iam_role.instance["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role.instance["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role.instance["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021-04-15T20:18:09.695+1200 [DEBUG] Resource instance state not found for node "aws_iam_role.instance[\"baz\"]", instance aws_iam_role.instance["baz"]
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:09.695+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance[\"bar\"]" references: []
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:09.695+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance[\"baz\"]" references: []
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:09.695+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:09.695+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.instance[\"foo\"]" references: []
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.RootTransformer
2021-04-15T20:18:09.695+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
aws_iam_role.instance["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role.instance["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role.instance["foo"] - *terraform.NodePlannableResourceInstance
root - terraform.graphNodeRoot
aws_iam_role.instance["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role.instance["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role.instance["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance": entering dynamic subgraph
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.test": expanding dynamic subgraph
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:09.695+1200 [TRACE] vertex "aws_iam_role.instance[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:09.695+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021-04-15T20:18:09.695+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.instance["foo"]
2021-04-15T20:18:09.696+1200 [TRACE] vertex "aws_iam_role.instance[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:09.696+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.instance["bar"]
2021-04-15T20:18:09.696+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.test["bar"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:09.696+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.instance["baz"]
2021-04-15T20:18:09.696+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.test["baz"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:09.696+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role.test["foo"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
aws_iam_role.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role.test["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021-04-15T20:18:09.696+1200 [DEBUG] Resource instance state not found for node "aws_iam_role.test[\"baz\"]", instance aws_iam_role.test["baz"]
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:09.696+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test[\"bar\"]" references: []
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:09.696+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test[\"baz\"]" references: []
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:09.696+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:09.696+1200 [DEBUG] ReferenceTransformer: "aws_iam_role.test[\"foo\"]" references: []
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021-04-15T20:18:09.696+1200 [TRACE] Executing graph transform *terraform.RootTransformer
2021-04-15T20:18:09.696+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
aws_iam_role.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role.test["foo"] - *terraform.NodePlannableResourceInstance
root - terraform.graphNodeRoot
aws_iam_role.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role.test["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:09.696+1200 [TRACE] vertex "aws_iam_role.test": entering dynamic subgraph
2021-04-15T20:18:09.696+1200 [TRACE] vertex "aws_iam_role.test[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:09.697+1200 [TRACE] vertex "aws_iam_role.test[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:09.697+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.test["foo"]
2021-04-15T20:18:09.697+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.test["foo"] is still 0; calling provider "aws" for any other minor fixups
2021-04-15T20:18:09.697+1200 [TRACE] GRPCProvider: UpgradeResourceState
2021-04-15T20:18:09.697+1200 [TRACE] readResourceInstanceState: no state present for aws_iam_role.instance["baz"]
2021-04-15T20:18:09.697+1200 [DEBUG] refresh: aws_iam_role.instance["baz"]: no state, so not refreshing
2021-04-15T20:18:09.697+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.instance["baz"]
2021-04-15T20:18:09.697+1200 [TRACE] writeResourceInstanceState: removing state object for aws_iam_role.instance["baz"]
2021-04-15T20:18:09.698+1200 [TRACE] vertex "aws_iam_role.test[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:09.698+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.test["baz"]
2021-04-15T20:18:09.698+1200 [TRACE] readResourceInstanceState: no state present for aws_iam_role.test["baz"]
2021-04-15T20:18:09.698+1200 [DEBUG] refresh: aws_iam_role.test["baz"]: no state, so not refreshing
2021-04-15T20:18:09.698+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.test["baz"]
2021-04-15T20:18:09.698+1200 [TRACE] writeResourceInstanceState: removing state object for aws_iam_role.test["baz"]
2021-04-15T20:18:09.699+1200 [TRACE] Re-validating config for "aws_iam_role.instance[\"baz\"]"
2021-04-15T20:18:09.699+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:09.699+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.instance["bar"] is still 0; calling provider "aws" for any other minor fixups
2021-04-15T20:18:09.699+1200 [TRACE] GRPCProvider: UpgradeResourceState
2021-04-15T20:18:09.699+1200 [TRACE] Re-validating config for "aws_iam_role.test[\"baz\"]"
2021-04-15T20:18:09.699+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:09.699+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.instance["foo"] is still 0; calling provider "aws" for any other minor fixups
2021-04-15T20:18:09.699+1200 [TRACE] GRPCProvider: UpgradeResourceState
2021-04-15T20:18:09.699+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role.test["bar"]
2021-04-15T20:18:09.700+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role.test["bar"] is still 0; calling provider "aws" for any other minor fixups
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: UpgradeResourceState
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: PlanResourceChange
aws_iam_role.instance["bar"]: Refreshing state... [id=sebastian-instance-bar]
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: ReadResource
aws_iam_role.test["foo"]: Refreshing state... [id=sebastian-test-foo]
2021-04-15T20:18:09.700+1200 [TRACE] GRPCProvider: ReadResource
aws_iam_role.instance["foo"]: Refreshing state... [id=sebastian-instance-foo]
2021-04-15T20:18:09.701+1200 [TRACE] GRPCProvider: ReadResource
aws_iam_role.test["bar"]: Refreshing state... [id=sebastian-test-bar]
2021-04-15T20:18:09.701+1200 [TRACE] GRPCProvider: ReadResource
2021-04-15T20:18:09.701+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:09.701+1200
2021-04-15T20:18:09.701+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:09.701+1200
2021-04-15T20:18:09.701+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:09.701+1200
2021-04-15T20:18:09.701+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.instance["baz"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .force_detach_policies: planned value cty.False for a non-computed attribute
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute
- .path: planned value cty.StringVal("/") for a non-computed attribute
- .inline_policy: attribute representing nested block must not be unknown itself; set nested attribute values to unknown instead
2021-04-15T20:18:09.701+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["baz"]
2021-04-15T20:18:09.701+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.test["baz"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute
- .path: planned value cty.StringVal("/") for a non-computed attribute
- .force_detach_policies: planned value cty.False for a non-computed attribute
- .inline_policy: attribute representing nested block must not be unknown itself; set nested attribute values to unknown instead
2021-04-15T20:18:09.701+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 61
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=4c4845118c575ce40151bb9e60416228da9a7d05cab789ecafb7c10e0a743b4d
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081809Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetRole&RoleName=sebastian-test-foo&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.701+1200
2021-04-15T20:18:09.701+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["baz"]
2021-04-15T20:18:09.702+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 65
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=3143a2ed953a9e64ed1cc4c6aebcfe19dca3536eb85bfda43729637b2c152595
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081809Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetRole&RoleName=sebastian-instance-bar&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.701+1200
2021-04-15T20:18:09.702+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 65
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=e53647a03fec419e40f2f7d304776a45496f79a055739d86474f89601aea998a
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081809Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetRole&RoleName=sebastian-instance-foo&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.701+1200
2021-04-15T20:18:09.702+1200 [TRACE] writeChange: recorded Create change for aws_iam_role.instance["baz"]
2021-04-15T20:18:09.702+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:09.702+1200
2021-04-15T20:18:09.702+1200 [TRACE] vertex "aws_iam_role.instance[\"baz\"]": visit complete
2021-04-15T20:18:09.702+1200 [TRACE] writeChange: recorded Create change for aws_iam_role.test["baz"]
2021-04-15T20:18:09.702+1200 [TRACE] vertex "aws_iam_role.test[\"baz\"]": visit complete
2021-04-15T20:18:09.702+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 61
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=809ea1867e9958c03c9328318382a1cd432b2c8e71da528d91ebec31d2663b13
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081809Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetRole&RoleName=sebastian-test-bar&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:09.702+1200
2021-04-15T20:18:10.610+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 862
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:10 GMT
X-Amzn-Requestid: 4133af62-cdd3-4417-892f-624b78c08fa8
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.610+1200
2021-04-15T20:18:10.610+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetRoleResult>
<Role>
<Path>/</Path>
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A202656505727%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
<MaxSessionDuration>3600</MaxSessionDuration>
<RoleId>AROARF4HWBBN3TTYU4P2C</RoleId>
<RoleLastUsed/>
<RoleName>sebastian-test-foo</RoleName>
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-test-foo</Arn>
<CreateDate>2021-04-15T08:07:27Z</CreateDate>
</Role>
</GetRoleResult>
<ResponseMetadata>
<RequestId>4133af62-cdd3-4417-892f-624b78c08fa8</RequestId>
</ResponseMetadata>
</GetRoleResponse>: timestamp=2021-04-15T20:18:10.610+1200
2021-04-15T20:18:10.610+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 870
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:09 GMT
X-Amzn-Requestid: 49ec0fe5-5ffc-4632-885a-4422cdbe5ef2
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.610+1200
2021-04-15T20:18:10.610+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetRoleResult>
<Role>
<Path>/</Path>
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A202656505727%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
<MaxSessionDuration>3600</MaxSessionDuration>
<RoleId>AROARF4HWBBN4CZUJNLM2</RoleId>
<RoleLastUsed/>
<RoleName>sebastian-instance-bar</RoleName>
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-bar</Arn>
<CreateDate>2021-04-15T08:13:10Z</CreateDate>
</Role>
</GetRoleResult>
<ResponseMetadata>
<RequestId>49ec0fe5-5ffc-4632-885a-4422cdbe5ef2</RequestId>
</ResponseMetadata>
</GetRoleResponse>: timestamp=2021-04-15T20:18:10.610+1200
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 74
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=0a8996e8c21a7b779c52284a9726a2397950eb0737295652cfdb145aa8df72ab
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081810Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListRolePolicies&RoleName=sebastian-instance-bar&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.610+1200
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 70
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=aeb739589b2012bb4997c973b1f73d7b3c11d66aafa8a917fca8835e1eca5478
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081810Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListRolePolicies&RoleName=sebastian-test-foo&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.611+1200
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 870
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:09 GMT
X-Amzn-Requestid: 9a24a6a5-267f-4af4-88a9-14d11b13014f
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.611+1200
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetRoleResult>
<Role>
<Path>/</Path>
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A202656505727%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
<MaxSessionDuration>3600</MaxSessionDuration>
<RoleId>AROARF4HWBBNUGW2EAT26</RoleId>
<RoleLastUsed/>
<RoleName>sebastian-instance-foo</RoleName>
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-foo</Arn>
<CreateDate>2021-04-15T08:13:10Z</CreateDate>
</Role>
</GetRoleResult>
<ResponseMetadata>
<RequestId>9a24a6a5-267f-4af4-88a9-14d11b13014f</RequestId>
</ResponseMetadata>
</GetRoleResponse>: timestamp=2021-04-15T20:18:10.611+1200
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 862
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:09 GMT
X-Amzn-Requestid: da3ca0d6-1e9c-404f-a44e-174c5e0a1b55
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.611+1200
2021-04-15T20:18:10.611+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetRoleResult>
<Role>
<Path>/</Path>
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A202656505727%3Aroot%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
<MaxSessionDuration>3600</MaxSessionDuration>
<RoleId>AROARF4HWBBNTZECDLEPK</RoleId>
<RoleLastUsed/>
<RoleName>sebastian-test-bar</RoleName>
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-test-bar</Arn>
<CreateDate>2021-04-15T08:07:27Z</CreateDate>
</Role>
</GetRoleResult>
<ResponseMetadata>
<RequestId>da3ca0d6-1e9c-404f-a44e-174c5e0a1b55</RequestId>
</ResponseMetadata>
</GetRoleResponse>: timestamp=2021-04-15T20:18:10.611+1200
2021-04-15T20:18:10.612+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 74
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=47d2239ad1283317b801aaa156f4a3ab972c379d0f224176bca0c27d067044bd
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081810Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListRolePolicies&RoleName=sebastian-instance-foo&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.612+1200
2021-04-15T20:18:10.612+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 70
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=eda939d6cd3815101bd2f4a51c86180ca7a558fb7a5d50607b119e0a65e1d0d9
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081810Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListRolePolicies&RoleName=sebastian-test-bar&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:10.612+1200
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 323
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:11 GMT
X-Amzn-Requestid: e3bf20ef-fa38-4f23-bc57-90534645c018
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 323
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:11 GMT
X-Amzn-Requestid: 19a7547b-d39d-492c-8034-700116ed5447
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<PolicyNames/>
</ListRolePoliciesResult>
<ResponseMetadata>
<RequestId>19a7547b-d39d-492c-8034-700116ed5447</RequestId>
</ResponseMetadata>
</ListRolePoliciesResponse>: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 323
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:10 GMT
X-Amzn-Requestid: 623d8b1a-1c24-464a-8608-eef9d36e5846
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<PolicyNames/>
</ListRolePoliciesResult>
<ResponseMetadata>
<RequestId>623d8b1a-1c24-464a-8608-eef9d36e5846</RequestId>
</ResponseMetadata>
</ListRolePoliciesResponse>: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 323
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:10 GMT
X-Amzn-Requestid: d3e48d49-a108-4f95-bfea-72b9c89937c8
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<PolicyNames/>
</ListRolePoliciesResult>
<ResponseMetadata>
<RequestId>d3e48d49-a108-4f95-bfea-72b9c89937c8</RequestId>
</ResponseMetadata>
</ListRolePoliciesResponse>: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.546+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<PolicyNames/>
</ListRolePoliciesResult>
<ResponseMetadata>
<RequestId>e3bf20ef-fa38-4f23-bc57-90534645c018</RequestId>
</ResponseMetadata>
</ListRolePoliciesResponse>: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.547+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 78
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=b1be52b7d20be8526c69284d0b4944b87d83c00ecf0abb5a0dc52884f70352ef
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081811Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=sebastian-test-bar&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.546+1200
2021-04-15T20:18:11.547+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 82
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=e2a2cb5fb7f03aeb9f0cf258120cad11563f23fde1feebefa8a3fd12c72b25a0
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081811Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=sebastian-instance-foo&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.547+1200
2021-04-15T20:18:11.547+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 82
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=c16f58d08d6282960c61ac1a17751fefc7fc82e6bfdaf226f796087ce35877af
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081811Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=sebastian-instance-bar&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.547+1200
2021-04-15T20:18:11.547+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 78
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=38c0f981ad9e21200b839ee2a004f9bbb269490a3b175b58016b43444f0a495d
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081811Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=sebastian-test-foo&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:11.547+1200
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "data.aws_iam_policy_document.test (expand)" is waiting for "aws_iam_role.instance (expand)"
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.test (expand)"
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.test (expand)" is waiting for "aws_iam_role.test (expand)"
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "root" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"] (close)"
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "aws_iam_role_policy_attachment.test (expand)"
2021-04-15T20:18:11.904+1200 [TRACE] dag/walk: vertex "aws_iam_policy.test (expand)" is waiting for "data.aws_iam_policy_document.test (expand)"
2021-04-15T20:18:12.497+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 360
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:12 GMT
X-Amzn-Requestid: ff5dc254-6331-47bf-a1b6-c3082df1ab81
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.497+1200
2021-04-15T20:18:12.497+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies/>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>ff5dc254-6331-47bf-a1b6-c3082df1ab81</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:12.497+1200
2021-04-15T20:18:12.497+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 549
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:12 GMT
X-Amzn-Requestid: 55cec858-a1c9-44f8-99d3-0bd1158aedbd
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.497+1200
2021-04-15T20:18:12.498+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies>
<member>
<PolicyArn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo</PolicyArn>
<PolicyName>sebastian-test=foo</PolicyName>
</member>
</AttachedPolicies>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>55cec858-a1c9-44f8-99d3-0bd1158aedbd</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:12.497+1200
2021-04-15T20:18:12.498+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.test["foo"]
2021-04-15T20:18:12.498+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["foo"]
2021-04-15T20:18:12.498+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for aws_iam_role.instance["foo"] during refresh.
- .tags: was null, but now cty.MapValEmpty(cty.String)
2021-04-15T20:18:12.499+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.instance["foo"]
2021-04-15T20:18:12.499+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["foo"]
2021-04-15T20:18:12.499+1200 [TRACE] Re-validating config for "aws_iam_role.test[\"foo\"]"
2021-04-15T20:18:12.499+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:12.500+1200 [TRACE] Re-validating config for "aws_iam_role.instance[\"foo\"]"
2021-04-15T20:18:12.500+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:12.500+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:12.500+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:12.501+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.test["foo"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute
- .path: planned value cty.StringVal("/") for a non-computed attribute
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute
- .description: planned value cty.StringVal("") for a non-computed attribute
- .force_detach_policies: planned value cty.False for a non-computed attribute
2021-04-15T20:18:12.502+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.instance["foo"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute
- .description: planned value cty.StringVal("") for a non-computed attribute
- .force_detach_policies: planned value cty.False for a non-computed attribute
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute
- .path: planned value cty.StringVal("/") for a non-computed attribute
2021-04-15T20:18:12.502+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["foo"]
2021-04-15T20:18:12.502+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["foo"]
2021-04-15T20:18:12.502+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role.instance["foo"]
2021-04-15T20:18:12.502+1200 [TRACE] vertex "aws_iam_role.instance[\"foo\"]": visit complete
2021-04-15T20:18:12.502+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role.test["foo"]
2021-04-15T20:18:12.502+1200 [TRACE] vertex "aws_iam_role.test[\"foo\"]": visit complete
2021-04-15T20:18:12.503+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 360
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:11 GMT
X-Amzn-Requestid: 00b712e1-02bd-4eff-b3e0-65ec5dc8f516
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.502+1200
2021-04-15T20:18:12.503+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies/>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>00b712e1-02bd-4eff-b3e0-65ec5dc8f516</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:12.503+1200
2021-04-15T20:18:12.503+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for aws_iam_role.instance["bar"] during refresh.
- .tags: was null, but now cty.MapValEmpty(cty.String)
2021-04-15T20:18:12.503+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.instance["bar"]
2021-04-15T20:18:12.503+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["bar"]
2021-04-15T20:18:12.504+1200 [TRACE] Re-validating config for "aws_iam_role.instance[\"bar\"]"
2021-04-15T20:18:12.504+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:12.504+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 549
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:12 GMT
X-Amzn-Requestid: 2391f69c-1305-43c8-9a83-1ba7dfff7727
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.504+1200
2021-04-15T20:18:12.504+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies>
<member>
<PolicyArn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar</PolicyArn>
<PolicyName>sebastian-test=bar</PolicyName>
</member>
</AttachedPolicies>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>2391f69c-1305-43c8-9a83-1ba7dfff7727</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:12.504+1200
2021-04-15T20:18:12.505+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:12.505+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role.test["bar"]
2021-04-15T20:18:12.505+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["bar"]
2021-04-15T20:18:12.505+1200 [TRACE] Re-validating config for "aws_iam_role.test[\"bar\"]"
2021-04-15T20:18:12.505+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:12.505+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.instance["bar"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute
- .path: planned value cty.StringVal("/") for a non-computed attribute
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute
- .description: planned value cty.StringVal("") for a non-computed attribute
- .force_detach_policies: planned value cty.False for a non-computed attribute
2021-04-15T20:18:12.505+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.instance["bar"]
2021-04-15T20:18:12.506+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:12.506+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role.instance["bar"]
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance[\"bar\"]": visit complete
2021-04-15T20:18:12.506+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021-04-15T20:18:12.506+1200 [TRACE] vertex "root": visit complete
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance": dynamic subgraph completed successfully
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance": visit complete
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance (expand)": dynamic subgraph completed successfully
2021-04-15T20:18:12.506+1200 [TRACE] vertex "aws_iam_role.instance (expand)": visit complete
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": expanding dynamic subgraph
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": entering dynamic subgraph
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test": starting visit (*terraform.NodePlannableResource)
2021-04-15T20:18:12.506+1200 [TRACE] vertex "data.aws_iam_policy_document.test": expanding dynamic subgraph
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021-04-15T20:18:12.506+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.test["bar"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:12.506+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.test["baz"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:12.506+1200 [TRACE] ResourceCountTransformer: adding data.aws_iam_policy_document.test["foo"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:12.506+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
data.aws_iam_policy_document.test["bar"] - *terraform.NodePlannableResourceInstance
data.aws_iam_policy_document.test["baz"] - *terraform.NodePlannableResourceInstance
data.aws_iam_policy_document.test["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021-04-15T20:18:12.506+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021-04-15T20:18:12.506+1200 [DEBUG] Resource instance state not found for node "data.aws_iam_policy_document.test[\"baz\"]", instance data.aws_iam_policy_document.test["baz"]
2021-04-15T20:18:12.506+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021-04-15T20:18:12.506+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021-04-15T20:18:12.506+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.instance"
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.506+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test[\"bar\"]" references: []
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.instance"
2021-04-15T20:18:12.506+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.506+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test[\"baz\"]" references: []
2021-04-15T20:18:12.507+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:12.507+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.instance"
2021-04-15T20:18:12.507+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.507+1200 [DEBUG] ReferenceTransformer: "data.aws_iam_policy_document.test[\"foo\"]" references: []
2021-04-15T20:18:12.507+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021-04-15T20:18:12.507+1200 [TRACE] Executing graph transform *terraform.RootTransformer
2021-04-15T20:18:12.507+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_role.test["bar"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .description: planned value cty.StringVal("") for a non-computed attribute
- .force_detach_policies: planned value cty.False for a non-computed attribute
- .max_session_duration: planned value cty.NumberIntVal(3600) for a non-computed attribute
- .path: planned value cty.StringVal("/") for a non-computed attribute
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute
2021-04-15T20:18:12.507+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
data.aws_iam_policy_document.test["bar"] - *terraform.NodePlannableResourceInstance
data.aws_iam_policy_document.test["baz"] - *terraform.NodePlannableResourceInstance
data.aws_iam_policy_document.test["foo"] - *terraform.NodePlannableResourceInstance
root - terraform.graphNodeRoot
data.aws_iam_policy_document.test["bar"] - *terraform.NodePlannableResourceInstance
data.aws_iam_policy_document.test["baz"] - *terraform.NodePlannableResourceInstance
data.aws_iam_policy_document.test["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:12.507+1200 [TRACE] vertex "data.aws_iam_policy_document.test": entering dynamic subgraph
2021-04-15T20:18:12.507+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role.test["bar"]
2021-04-15T20:18:12.507+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:12.507+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:12.507+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.test["baz"]
2021-04-15T20:18:12.507+1200 [TRACE] readResourceInstanceState: no state present for data.aws_iam_policy_document.test["baz"]
2021-04-15T20:18:12.507+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:12.507+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.test["foo"]
2021-04-15T20:18:12.507+1200 [TRACE] readResourceInstanceState: reading state for data.aws_iam_policy_document.test["bar"]
2021-04-15T20:18:12.507+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role.test["bar"]
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test[\"bar\"]": visit complete
2021-04-15T20:18:12.507+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021-04-15T20:18:12.507+1200 [TRACE] vertex "root": visit complete
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test": dynamic subgraph completed successfully
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test": visit complete
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test (expand)": dynamic subgraph completed successfully
2021-04-15T20:18:12.507+1200 [TRACE] vertex "aws_iam_role.test (expand)": visit complete
2021-04-15T20:18:12.508+1200 [TRACE] planDataSource: data.aws_iam_policy_document.test["baz"] configuration not fully known yet, so deferring to apply phase
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.test["baz"]
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["baz"]
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["baz"]
2021-04-15T20:18:12.508+1200 [TRACE] planDataSource: data.aws_iam_policy_document.test["bar"] configuration is fully known, but we're forcing a read plan to be created
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.test["bar"]
2021-04-15T20:18:12.508+1200 [TRACE] writeChange: recorded Read change for data.aws_iam_policy_document.test["baz"]
2021-04-15T20:18:12.508+1200 [TRACE] planDataSource: data.aws_iam_policy_document.test["foo"] configuration is fully known, but we're forcing a read plan to be created
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: using RefreshState for data.aws_iam_policy_document.test["foo"]
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["bar"]
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"baz\"]": visit complete
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["foo"]
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["bar"]
2021-04-15T20:18:12.508+1200 [TRACE] writeResourceInstanceState: writing current state object for data.aws_iam_policy_document.test["foo"]
2021-04-15T20:18:12.508+1200 [TRACE] writeChange: recorded Read change for data.aws_iam_policy_document.test["bar"]
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test[\"bar\"]": visit complete
2021-04-15T20:18:12.508+1200 [TRACE] writeChange: recorded Read change for data.aws_iam_policy_document.test["foo"]
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_poliaws_iam_policy.test["foo"]: Refreshing state... [id=arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo]
cy_document.test[\"foo\"]": visit complete
2021-04-15T20:18:12.508+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021-04-15T20:18:12.508+1200 [TRACE] vertex "root": visit complete
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test": dynamic subgraph completed successfully
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test": visit complete
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": dynamic subgraph completed successfully
2021-04-15T20:18:12.508+1200 [TRACE] vertex "data.aws_iam_policy_document.test (expand)": visit complete
2021-04-15T20:18:12.508+1200 [TRACE] vertex "aws_iam_policy.test (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test (expand)": expanding dynamic subgraph
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test (expand)": entering dynamic subgraph
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test": starting visit (*terraform.NodePlannableResource)
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test": expanding dynamic subgraph
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021-04-15T20:18:12.509+1200 [TRACE] ResourceCountTransformer: adding aws_iam_policy.test["bar"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:12.509+1200 [TRACE] ResourceCountTransformer: adding aws_iam_policy.test["baz"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:12.509+1200 [TRACE] ResourceCountTransformer: adding aws_iam_policy.test["foo"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
aws_iam_policy.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_policy.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_policy.test["foo"] - *terraform.NodePlannableResourceIaws_iam_policy.test["bar"]: Refreshing state... [id=arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar]
nstance
------
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021-04-15T20:18:12.509+1200 [DEBUG] Resource instance state not found for node "aws_iam_policy.test[\"baz\"]", instance aws_iam_policy.test["baz"]
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "data.aws_iam_policy_document.test"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.509+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test[\"bar\"]" references: []
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "data.aws_iam_policy_document.test"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.509+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test[\"baz\"]" references: []
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "data.aws_iam_policy_document.test"
2021-04-15T20:18:12.509+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:12.509+1200 [DEBUG] ReferenceTransformer: "aws_iam_policy.test[\"foo\"]" references: []
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021-04-15T20:18:12.509+1200 [TRACE] Executing graph transform *terraform.RootTransformer
2021-04-15T20:18:12.509+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
aws_iam_policy.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_policy.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_policy.test["foo"] - *terraform.NodePlannableResourceInstance
root - terraform.graphNodeRoot
aws_iam_policy.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_policy.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_policy.test["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test": entering dynamic subgraph
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:12.509+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_policy.test["bar"]
2021-04-15T20:18:12.509+1200 [TRACE] vertex "aws_iam_policy.test[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:12.509+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_policy.test["baz"]
2021-04-15T20:18:12.509+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_policy.test["foo"]
2021-04-15T20:18:12.509+1200 [TRACE] readResourceInstanceState: no state present for aws_iam_policy.test["baz"]
2021-04-15T20:18:12.509+1200 [TRACE] upgradeResourceState: schema version of aws_iam_policy.test["foo"] is still 0; calling provider "aws" for any other minor fixups
2021-04-15T20:18:12.509+1200 [TRACE] GRPCProvider: UpgradeResourceState
2021-04-15T20:18:12.509+1200 [DEBUG] refresh: aws_iam_policy.test["baz"]: no state, so not refreshing
2021-04-15T20:18:12.509+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_policy.test["baz"]
2021-04-15T20:18:12.509+1200 [TRACE] writeResourceInstanceState: removing state object for aws_iam_policy.test["baz"]
2021-04-15T20:18:12.509+1200 [TRACE] upgradeResourceState: schema version of aws_iam_policy.test["bar"] is still 0; calling provider "aws" for any other minor fixups
2021-04-15T20:18:12.509+1200 [TRACE] GRPCProvider: UpgradeResourceState
2021-04-15T20:18:12.510+1200 [TRACE] Re-validating config for "aws_iam_policy.test[\"baz\"]"
2021-04-15T20:18:12.510+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:12.510+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:12.511+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_policy.test["baz"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .path: planned value cty.StringVal("/") for a non-computed attribute
2021-04-15T20:18:12.511+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["baz"]
2021-04-15T20:18:12.511+1200 [TRACE] writeChange: recorded Create change for aws_iam_policy.test["baz"]
2021-04-15T20:18:12.511+1200 [TRACE] vertex "aws_iam_policy.test[\"baz\"]": visit complete
2021-04-15T20:18:12.512+1200 [TRACE] GRPCProvider: ReadResource
2021-04-15T20:18:12.512+1200 [TRACE] GRPCProvider: ReadResource
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] Getting IAM Policy: {
PolicyArn: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo"
}: timestamp=2021-04-15T20:18:12.512+1200
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:12.512+1200
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] Getting IAM Policy: {
PolicyArn: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar"
}: timestamp=2021-04-15T20:18:12.512+1200
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:12.512+1200
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicy Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 111
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=d44e5477a89a0e65766b3527afd016042307149a461514bf04370f536d0d598d
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081812Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetPolicy&PolicyArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Apolicy%2Fsebastian-test%3Dfoo&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.512+1200
2021-04-15T20:18:12.512+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:12 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicy Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 111
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=2eeba250183a8d4c7c391701139ccdb180dc39e690d2e3988fa319d543320c21
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081812Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetPolicy&PolicyArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Apolicy%2Fsebastian-test%3Dbar&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:12.512+1200
2021-04-15T20:18:13.489+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicy Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 773
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:12 GMT
X-Amzn-Requestid: d69ef89f-2ef5-4030-8d31-6403497312e6
-----------------------------------------------------: timestamp=2021-04-15T20:18:13.489+1200
2021-04-15T20:18:13.489+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] <GetPolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetPolicyResult>
<Policy>
<PermissionsBoundaryUsageCount>0</PermissionsBoundaryUsageCount>
<Path>/</Path>
<UpdateDate>2021-04-15T08:13:15Z</UpdateDate>
<PolicyId>ANPARF4HWBBNR5ZRPI7GS</PolicyId>
<DefaultVersionId>v2</DefaultVersionId>
<PolicyName>sebastian-test=foo</PolicyName>
<IsAttachable>true</IsAttachable>
<AttachmentCount>1</AttachmentCount>
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo</Arn>
<CreateDate>2021-04-15T08:09:01Z</CreateDate>
<Tags/>
</Policy>
</GetPolicyResult>
<ResponseMetadata>
<RequestId>d69ef89f-2ef5-4030-8d31-6403497312e6</RequestId>
</ResponseMetadata>
</GetPolicyResponse>: timestamp=2021-04-15T20:18:13.489+1200
2021-04-15T20:18:13.489+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicy Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 773
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:13 GMT
X-Amzn-Requestid: 95e3bf53-59ad-4829-9893-2c04185825aa
-----------------------------------------------------: timestamp=2021-04-15T20:18:13.489+1200
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] <GetPolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetPolicyResult>
<Policy>
<PermissionsBoundaryUsageCount>0</PermissionsBoundaryUsageCount>
<Path>/</Path>
<UpdateDate>2021-04-15T08:13:15Z</UpdateDate>
<PolicyId>ANPARF4HWBBN5GGMTMGSD</PolicyId>
<DefaultVersionId>v2</DefaultVersionId>
<PolicyName>sebastian-test=bar</PolicyName>
<IsAttachable>true</IsAttachable>
<AttachmentCount>1</AttachmentCount>
<Arn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar</Arn>
<CreateDate>2021-04-15T08:09:03Z</CreateDate>
<Tags/>
</Policy>
</GetPolicyResult>
<ResponseMetadata>
<RequestId>95e3bf53-59ad-4829-9893-2c04185825aa</RequestId>
</ResponseMetadata>
</GetPolicyResponse>: timestamp=2021-04-15T20:18:13.489+1200
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] Getting IAM Policy Version: {
PolicyArn: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo",
VersionId: "v2"
}: timestamp=2021-04-15T20:18:13.489+1200
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:13.489+1200
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] Getting IAM Policy Version: {
PolicyArn: "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar",
VersionId: "v2"
}: timestamp=2021-04-15T20:18:13.489+1200
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:13.489+1200
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicyVersion Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 131
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=8dedf966c1c08ebe2aca4b7baee88020ec2d60a8488c6f71e74fa4108123b2cb
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081813Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetPolicyVersion&PolicyArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Apolicy%2Fsebastian-test%3Dfoo&Version=2010-05-08&VersionId=v2
-----------------------------------------------------: timestamp=2021-04-15T20:18:13.490+1200
2021-04-15T20:18:13.490+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:13 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicyVersion Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 131
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=10a0bc4083642dc1eff4fb22dacaa5aea2906f43f050bb6ac591596d0e191d9d
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081813Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=GetPolicyVersion&PolicyArn=arn%3Aaws%3Aiam%3A%3A081352067163%3Apolicy%2Fsebastian-test%3Dbar&Version=2010-05-08&VersionId=v2
-----------------------------------------------------: timestamp=2021-04-15T20:18:13.490+1200
2021-04-15T20:18:14.589+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicyVersion Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 884
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:14 GMT
X-Amzn-Requestid: ee933c86-6888-4804-8e01-5dc525b10079
-----------------------------------------------------: timestamp=2021-04-15T20:18:14.589+1200
2021-04-15T20:18:14.589+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] <GetPolicyVersionResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetPolicyVersionResult>
<PolicyVersion>
<VersionId>v2</VersionId>
<IsDefaultVersion>true</IsDefaultVersion>
<Document>%7B%0A%20%20%22Version%22%3A%20%222012-10-17%22%2C%0A%20%20%22Statement%22%3A%20%5B%0A%20%20%20%20%7B%0A%20%20%20%20%20%20%22Sid%22%3A%20%22SetRole%22%2C%0A%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%22Action%22%3A%20%22iam%3APassRole%22%2C%0A%20%20%20%20%20%20%22Resource%22%3A%20%22arn%3Aaws%3Aiam%3A%3A081352067163%3Arole%2Fsebastian-instance-bar%22%0A%20%20%20%20%7D%0A%20%20%5D%0A%7D</Document>
<CreateDate>2021-04-15T08:13:15Z</CreateDate>
</PolicyVersion>
</GetPolicyVersionResult>
<ResponseMetadata>
<RequestId>ee933c86-6888-4804-8e01-5dc525b10079</RequestId>
</ResponseMetadata>
</GetPolicyVersionResponse>: timestamp=2021-04-15T20:18:14.589+1200
2021-04-15T20:18:14.589+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicyVersion Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 884
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:13 GMT
X-Amzn-Requestid: 9fca6027-d20d-4faa-a8bd-b72dc315d2cf
-----------------------------------------------------: timestamp=2021-04-15T20:18:14.589+1200
2021-04-15T20:18:14.589+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] <GetPolicyVersionResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetPolicyVersionResult>
<PolicyVersion>
<VersionId>v2</VersionId>
<IsDefaultVersion>true</IsDefaultVersion>
<Document>%7B%0A%20%20%22Version%22%3A%20%222012-10-17%22%2C%0A%20%20%22Statement%22%3A%20%5B%0A%20%20%20%20%7B%0A%20%20%20%20%20%20%22Sid%22%3A%20%22SetRole%22%2C%0A%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%22Action%22%3A%20%22iam%3APassRole%22%2C%0A%20%20%20%20%20%20%22Resource%22%3A%20%22arn%3Aaws%3Aiam%3A%3A081352067163%3Arole%2Fsebastian-instance-foo%22%0A%20%20%20%20%7D%0A%20%20%5D%0A%7D</Document>
<CreateDate>2021-04-15T08:13:15Z</CreateDate>
</PolicyVersion>
</GetPolicyVersionResult>
<ResponseMetadata>
<RequestId>9fca6027-d20d-4faa-a8bd-b72dc315d2cf</RequestId>
</ResponseMetadata>
</GetPolicyVersionResponse>: timestamp=2021-04-15T20:18:14.589+1200
2021-04-15T20:18:14.590+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_policy.test["foo"]
2021-04-15T20:18:14.590+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["foo"]
2021-04-15T20:18:14.590+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_policy.test["bar"]
2021-04-15T20:18:14.590+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["bar"]
2021-04-15T20:18:14.590+1200 [TRACE] Re-validating config for "aws_iam_policy.test[\"foo\"]"
2021-04-15T20:18:14.590+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:14.590+1200 [TRACE] Re-validating config for "aws_iam_policy.test[\"bar\"]"
2021-04-15T20:18:14.590+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:14.591+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:14.591+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:14.592+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_policy.test["bar"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute
- .description: planned value cty.StringVal("") for a non-computed attribute
- .path: planned value cty.StringVal("/") for a non-computed attribute
2021-04-15T20:18:14.592+1200 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an invalid plan for aws_iam_policy.test["foo"], but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .description: planned value cty.StringVal("") for a non-computed attribute
- .path: planned value cty.StringVal("/") for a non-computed attribute
- .tags: planned value cty.MapValEmpty(cty.String) for a non-computed attribute
aws_iam_role_policy_attachment.test["foo"]: Refreshing state... [id=sebastian-test-foo-20210415080908613900000001]
2021-04-15T20:18:14.592+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["bar"]
2021-04-15T20:18:14.592+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_policy.test["foo"]
2021-04-15T20:18:14.592+1200 [TRACE] writeChange: recorded Update change for aws_iam_policy.test["bar"]
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test[\"bar\"]": visit complete
2021-04-15T20:18:14.592+1200 [TRACE] writeChange: recorded Update change for aws_iam_policy.test["foo"]
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test[\"foo\"]": visit complete
2021-04-15T20:18:14.592+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021-04-15T20:18:14.592+1200 [TRACE] vertex "root": visit complete
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test": dynamic subgraph completed successfully
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test": visit complete
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test (expand)": dynamic subgraph completed successfully
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_policy.test (expand)": visit complete
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": expanding dynamic subgraph
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": entering dynamic subgraph
2021-04-15T20:18:14.592+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": starting visit (*terraform.NodePlannableResource)
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": expanding dynamic subgraph
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021-04-15T20:18:14.593+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role_policy_attachment.test["bar"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:14.593+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role_policy_attaws_iam_role_policy_attachment.test["bar"]: Refreshing state... [id=sebastian-test-bar-20210415080908630300000002]
achment.test["baz"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:14.593+1200 [TRACE] ResourceCountTransformer: adding aws_iam_role_policy_attachment.test["foo"] as *terraform.NodePlannableResourceInstance
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
aws_iam_role_policy_attachment.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role_policy_attachment.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role_policy_attachment.test["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021-04-15T20:18:14.593+1200 [DEBUG] Resource instance state not found for node "aws_iam_role_policy_attachment.test[\"baz\"]", instance aws_iam_role_policy_attachment.test["baz"]
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_policy.test"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.test"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:14.593+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test[\"baz\"]" references: []
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_policy.test"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.test"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:14.593+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test[\"foo\"]" references: []
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "local.users"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_policy.test"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "aws_iam_role.test"
2021-04-15T20:18:14.593+1200 [INFO] ReferenceTransformer: reference not found: "each.key"
2021-04-15T20:18:14.593+1200 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.test[\"bar\"]" references: []
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021-04-15T20:18:14.593+1200 [TRACE] Executing graph transform *terraform.RootTransformer
2021-04-15T20:18:14.593+1200 [TRACE] Completed graph transform *terraform.RootTransformer with new graph:
aws_iam_role_policy_attachment.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role_policy_attachment.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role_policy_attachment.test["foo"] - *terraform.NodePlannableResourceInstance
root - terraform.graphNodeRoot
aws_iam_role_policy_attachment.test["bar"] - *terraform.NodePlannableResourceInstance
aws_iam_role_policy_attachment.test["baz"] - *terraform.NodePlannableResourceInstance
aws_iam_role_policy_attachment.test["foo"] - *terraform.NodePlannableResourceInstance
------
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": entering dynamic subgraph
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"bar\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"baz\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:14.593+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"foo\"]": starting visit (*terraform.NodePlannableResourceInstance)
2021-04-15T20:18:14.593+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role_policy_attachment.test["bar"]
2021-04-15T20:18:14.594+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role_policy_attachment.test["baz"]
2021-04-15T20:18:14.594+1200 [TRACE] readResourceInstanceState: reading state for aws_iam_role_policy_attachment.test["foo"]
2021-04-15T20:18:14.594+1200 [TRACE] readResourceInstanceState: no state present for aws_iam_role_policy_attachment.test["baz"]
2021-04-15T20:18:14.594+1200 [DEBUG] refresh: aws_iam_role_policy_attachment.test["baz"]: no state, so not refreshing
2021-04-15T20:18:14.594+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role_policy_attachment.test["bar"] is still 0; calling provider "aws" for any other minor fixups
2021-04-15T20:18:14.594+1200 [TRACE] GRPCProvider: UpgradeResourceState
2021-04-15T20:18:14.594+1200 [TRACE] upgradeResourceState: schema version of aws_iam_role_policy_attachment.test["foo"] is still 0; calling provider "aws" for any other minor fixups
2021-04-15T20:18:14.594+1200 [TRACE] GRPCProvider: UpgradeResourceState
2021-04-15T20:18:14.594+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role_policy_attachment.test["baz"]
2021-04-15T20:18:14.594+1200 [TRACE] writeResourceInstanceState: removing state object for aws_iam_role_policy_attachment.test["baz"]
2021-04-15T20:18:14.594+1200 [TRACE] Re-validating config for "aws_iam_role_policy_attachment.test[\"baz\"]"
2021-04-15T20:18:14.594+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:14.595+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:14.595+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["baz"]
2021-04-15T20:18:14.595+1200 [TRACE] writeChange: recorded Create change for aws_iam_role_policy_attachment.test["baz"]
2021-04-15T20:18:14.595+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"baz\"]": visit complete
2021-04-15T20:18:14.596+1200 [TRACE] GRPCProvider: ReadResource
2021-04-15T20:18:14.596+1200 [TRACE] GRPCProvider: ReadResource
2021-04-15T20:18:14.597+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:14.597+1200
2021-04-15T20:18:14.597+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] Waiting for state to become: [success]: timestamp=2021-04-15T20:18:14.597+1200
2021-04-15T20:18:14.597+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 78
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=6da8ad08ed4dfde0f97bdb99ce50d8d8e347da00c92d5a877aae5181b9a9b697
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081814Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=sebastian-test-foo&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:14.597+1200
2021-04-15T20:18:14.597+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:14 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.38.12 (go1.16; darwin; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.15.0 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 78
Authorization: AWS4-HMAC-SHA256 Credential=ASIARF4HWBBNUEFPMRXA/20210415/us-east-1/iam/aws4_request, SignedHeaders=content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=75b39516e10f54da901ffcb39b8541cc9a177a04c5d4d492ce2f6f6a103c579c
Content-Type: application/x-www-form-urlencoded; charset=utf-8
X-Amz-Date: 20210415T081814Z
X-Amz-Security-Token: FwoGZXIvYXdzELr//////////wEaDLKiqOtSjU4iY2m5TyK7AUIs6Ip8ryOo07e4o3ucT4CTcdeXL5eCUKJNCQ+SN4yujPkpcHHqEAM+NSEaPb1Qy2qdpsSXeDQzPK/7QysE7evV+hnb/DEKWiq3ZsbFn28OaRCmSXQeoDmRs180g1wgWXot2UNI6MaD8ix94IixIvI5RMgp2KojkPRT+UC+aGQz80DV5yzenGAkr2ADFfpIg+XWbpHmEYVmgTNkdR2EiSY8gbp/RU3Jb0sqYrtu0Jnpn7UpjtabsGIFRYgowO3fgwYyLfdlzDwMZ8SjQ/qPN1hbMKPnKIhtiXWNg8kFL6mqmGzIoDo9tW+ex05Uuny9SA==
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=sebastian-test-bar&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-04-15T20:18:14.597+1200
2021-04-15T20:18:15.642+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:15 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 549
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:14 GMT
X-Amzn-Requestid: d4a7cff0-7689-42d2-bf6e-0e53222d25aa
-----------------------------------------------------: timestamp=2021-04-15T20:18:15.641+1200
2021-04-15T20:18:15.642+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:15 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 549
Content-Type: text/xml
Date: Thu, 15 Apr 2021 08:18:15 GMT
X-Amzn-Requestid: fdc7879a-c86b-4c4c-846a-444e2b30ba45
-----------------------------------------------------: timestamp=2021-04-15T20:18:15.641+1200
2021-04-15T20:18:15.642+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:15 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies>
<member>
<PolicyArn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar</PolicyArn>
<PolicyName>sebastian-test=bar</PolicyName>
</member>
</AttachedPolicies>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>fdc7879a-c86b-4c4c-846a-444e2b30ba45</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:15.641+1200
2021-04-15T20:18:15.642+1200 [INFO] provider.terraform-provider-aws_v3.36.0_x5: 2021/04/15 20:18:15 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies>
<member>
<PolicyArn>arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo</PolicyArn>
<PolicyName>sebastian-test=foo</PolicyName>
</member>
</AttachedPolicies>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>d4a7cff0-7689-42d2-bf6e-0e53222d25aa</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-04-15T20:18:15.641+1200
2021-04-15T20:18:15.642+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role_policy_attachment.test["foo"]
2021-04-15T20:18:15.642+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["foo"]
2021-04-15T20:18:15.642+1200 [TRACE] writeResourceInstanceState: using RefreshState for aws_iam_role_policy_attachment.test["bar"]
2021-04-15T20:18:15.642+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["bar"]
2021-04-15T20:18:15.643+1200 [TRACE] Re-validating config for "aws_iam_role_policy_attachment.test[\"foo\"]"
2021-04-15T20:18:15.643+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:15.643+1200 [TRACE] Re-validating config for "aws_iam_role_policy_attachment.test[\"bar\"]"
2021-04-15T20:18:15.643+1200 [TRACE] GRPCProvider: ValidateResourceConfig
2021-04-15T20:18:15.644+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:15.644+1200 [TRACE] GRPCProvider: PlanResourceChange
2021-04-15T20:18:15.644+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["foo"]
2021-04-15T20:18:15.644+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role_policy_attachment.test["foo"]
2021-04-15T20:18:15.644+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"foo\"]": visit complete
2021-04-15T20:18:15.644+1200 [TRACE] writeResourceInstanceState: writing current state object for aws_iam_role_policy_attachment.test["bar"]
2021-04-15T20:18:15.644+1200 [TRACE] writeChange: recorded NoOp change for aws_iam_role_policy_attachment.test["bar"]
2021-04-15T20:18:15.644+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test[\"bar\"]": visit complete
2021-04-15T20:18:15.645+1200 [TRACE] vertex "root": starting visit (terraform.graphNodeRoot)
2021-04-15T20:18:15.645+1200 [TRACE] vertex "root": visit complete
2021-04-15T20:18:15.645+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": dynamic subgraph completed successfully
2021-04-15T20:18:15.645+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test": visit complete
2021-04-15T20:18:15.645+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": dynamic subgraph completed successfully
2021-04-15T20:18:15.645+1200 [TRACE] vertex "aws_iam_role_policy_attachment.test (expand)": visit complete
2021-04-15T20:18:15.645+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider)
2021-04-15T20:18:15.645+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021-04-15T20:18:15.645+1200 [TRACE] GRPCProvider: Close
2021-04-15T20:18:15.645+1200 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-04-15T20:18:15.645+1200 [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-04-15T20:18:15.650+1200 [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.36.0/darwin_amd64/terraform-provider-aws_v3.36.0_x5 pid=55776
2021-04-15T20:18:15.650+1200 [DEBUG] provider: plugin exited
2021-04-15T20:18:15.650+1200 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete
2021-04-15T20:18:15.650+1200 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule)
2021-04-15T20:18:15.650+1200 [TRACE] vertex "root": visit complete
2021-04-15T20:18:15.650+1200 [INFO] backend/local: plan operation completed
2021-04-15T20:18:15.650+1200 [INFO] backend/local: writing plan output to: plan
Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following
symbols:
+ create
~ update in-place
<= read (data resources)
Terraform will perform the following actions:
# data.aws_iam_policy_document.test["bar"] will be read during apply
# (config refers to values not yet known)
<= data "aws_iam_policy_document" "test" {
~ id = "3285458131" -> (known after apply)
~ json = jsonencode(
{
- Statement = [
- {
- Action = "iam:PassRole"
- Effect = "Allow"
- Resource = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-bar"
- Sid = "SetRole"
},
]
- Version = "2012-10-17"
}
) -> (known after apply)
- version = "2012-10-17" -> null
~ statement {
- effect = "Allow" -> null
- not_actions = [] -> null
- not_resources = [] -> null
# (3 unchanged attributes hidden)
}
}
# data.aws_iam_policy_document.test["baz"] will be read during apply
# (config refers to values not yet known)
<= data "aws_iam_policy_document" "test" {
+ id = (known after apply)
+ json = (known after apply)
+ statement {
+ actions = [
+ "iam:PassRole",
]
+ resources = [
+ (known after apply),
]
+ sid = "SetRole"
}
}
# data.aws_iam_policy_document.test["foo"] will be read during apply
# (config refers to values not yet known)
<= data "aws_iam_policy_document" "test" {
~ id = "735970326" -> (known after apply)
~ json = jsonencode(
{
- Statement = [
- {
- Action = "iam:PassRole"
- Effect = "Allow"
- Resource = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-foo"
- Sid = "SetRole"
},
]
- Version = "2012-10-17"
}
) -> (known after apply)
- version = "2012-10-17" -> null
~ statement {
- effect = "Allow" -> null
- not_actions = [] -> null
- not_resources = [] -> null
# (3 unchanged attributes hidden)
}
}
# aws_iam_policy.test["bar"] will be updated in-place
~ resource "aws_iam_policy" "test" {
id = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=bar"
name = "sebastian-test=bar"
~ policy = jsonencode(
{
- Statement = [
- {
- Action = "iam:PassRole"
- Effect = "Allow"
- Resource = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-bar"
- Sid = "SetRole"
},
]
- Version = "2012-10-17"
}
) -> (known after apply)
tags = {}
# (3 unchanged attributes hidden)
}
# aws_iam_policy.test["baz"] will be created
+ resource "aws_iam_policy" "test" {
+ arn = (known after apply)
+ id = (known after apply)
+ name = "sebastian-test=baz"
+ path = "/"
+ policy = (known after apply)
+ policy_id = (known after apply)
}
# aws_iam_policy.test["foo"] will be updated in-place
~ resource "aws_iam_policy" "test" {
id = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:policy/sebastian-test=foo"
name = "sebastian-test=foo"
~ policy = jsonencode(
{
- Statement = [
- {
- Action = "iam:PassRole"
- Effect = "Allow"
- Resource = "arn:aws:iam::XXXXXXXXXXXXXXXXXXXXX:role/sebastian-instance-foo"
- Sid = "SetRole"
},
]
- Version = "2012-10-17"
}
) -> (known after apply)
tags = {}
# (3 unchanged attributes hidden)
}
# aws_iam_role.instance["baz"] will be created
+ resource "aws_iam_role" "instance" {
+ arn = (known after apply)
+ assume_role_policy = jsonencode(
{
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ AWS = "arn:aws:iam::YYYYYYYYYYYYYYYY:root"
}
+ Sid = ""
},
]
+ Version = "2012-10-17"
}
)
+ create_date = (known after apply)
+ force_detach_policies = false
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = "sebastian-instance-baz"
+ path = "/"
+ unique_id = (known after apply)
+ inline_policy {
+ name = (known after apply)
+ policy = (known after apply)
}
}
# aws_iam_role.test["baz"] will be created
+ resource "aws_iam_role" "test" {
+ arn = (known after apply)
+ assume_role_policy = jsonencode(
{
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ AWS = "arn:aws:iam::YYYYYYYYYYYYYYYY:root"
}
+ Sid = ""
},
]
+ Version = "2012-10-17"
}
)
+ create_date = (known after apply)
+ force_detach_policies = false
+ id = (known after apply)
+ managed_policy_arns = (known after apply)
+ max_session_duration = 3600
+ name = "sebastian-test-baz"
+ path = "/"
+ unique_id = (known after apply)
+ inline_policy {
+ name = (known after apply)
+ policy = (known after apply)
}
}
# aws_iam_role_policy_attachment.test["baz"] will be created
+ resource "aws_iam_role_policy_attachment" "test" {
+ id = (known after apply)
+ policy_arn = (known after apply)
+ role = "sebastian-test-baz"
}
Plan: 4 to add, 2 to change, 0 to destroy.
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
Saved the plan to: plan
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment