Skip to content

Instantly share code, notes, and snippets.

@shawn-sterling
Created May 12, 2021 22:32
Show Gist options
  • Save shawn-sterling/a08655c9dc03e77b1806544fbf6c862f to your computer and use it in GitHub Desktop.
Save shawn-sterling/a08655c9dc03e77b1806544fbf6c862f to your computer and use it in GitHub Desktop.
2021/05/12 22:07:21 [INFO] Terraform version: 0.14.5
2021/05/12 22:07:21 [INFO] Go runtime version: go1.15.6
2021/05/12 22:07:21 [INFO] CLI args: []string{"/usr/local/bin/terraform", "apply", "-auto-approve", "-var-file=/root/git/rce/fakename-control/terragrunt/fakename-network/global/iam/fakename-aws-iam-terraform-role/terragrunt-debug.tfvars.json", "/root/git/rce/fakename-control/terragrunt/fakename-network/global/iam/fakename-aws-iam-terraform-role/.terragrunt-cache/c-JNfw0xxoNyyafdW5hP4zJVvE8/SnVBr6KkkB3mx0pnP8MaWBd53qo"}
2021/05/12 22:07:21 [DEBUG] Attempting to open CLI config file: /root/.terraformrc
2021/05/12 22:07:21 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory /root/.terraform.d/plugins
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory /root/.local/share/terraform/plugins
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory /usr/local/share/terraform/plugins
2021/05/12 22:07:21 [DEBUG] ignoring non-existing provider search directory /usr/share/terraform/plugins
2021/05/12 22:07:21 [INFO] CLI command args: []string{"apply", "-auto-approve", "-var-file=/root/git/rce/fakename-control/terragrunt/fakename-network/global/iam/fakename-aws-iam-terraform-role/terragrunt-debug.tfvars.json", "/root/git/rce/fakename-control/terragrunt/fakename-network/global/iam/fakename-aws-iam-terraform-role/.terragrunt-cache/c-JNfw0xxoNyyafdW5hP4zJVvE8/SnVBr6KkkB3mx0pnP8MaWBd53qo"}
2021/05/12 22:07:21 [TRACE] Meta.Backend: built configuration for "s3" backend with hash value 821729936
2021/05/12 22:07:21 [TRACE] Preserving existing state lineage "8e65593a-d27e-564d-ef7e-cb4271a73ef7"
2021/05/12 22:07:21 [TRACE] Preserving existing state lineage "8e65593a-d27e-564d-ef7e-cb4271a73ef7"
2021/05/12 22:07:21 [TRACE] Meta.Backend: working directory was previously initialized for "s3" backend
2021/05/12 22:07:21 [TRACE] Meta.Backend: using already-initialized, unchanged "s3" backend configuration
2021/05/12 22:07:21 [INFO] AWS Auth provider used: "EnvProvider"
2021/05/12 22:07:21 [INFO] Attempting to AssumeRole arn:aws:iam::000000000001:role/terraform-usage-role (SessionName: "", ExternalId: "")
2021/05/12 22:07:32 [TRACE] Meta.Backend: instantiated backend of type *s3.Backend
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: scanning directory .terraform/providers
2021/05/12 22:07:32 [TRACE] getproviders.SearchLocalDirectory: .terraform/providers is a symlink to .terraform/providers
2021/05/12 22:07:32 [TRACE] getproviders.SearchLocalDirectory: found registry.terraform.io/hashicorp/aws v3.33.0 for linux_amd64 at .terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: including .terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64 as a candidate package for registry.terraform.io/hashicorp/aws 3.33.0
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers
2021/05/12 22:07:32 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers
2021/05/12 22:07:33 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers
2021/05/12 22:07:33 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers
2021/05/12 22:07:33 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers
2021/05/12 22:07:33 [TRACE] providercache.fillMetaCache: using cached result from previous scan of .terraform/providers
2021/05/12 22:07:33 [WARN] Failed to determine selected providers: 7 errors occurred:
* there is no package for registry.terraform.io/hashicorp/null 3.1.0 cached in .terraform/providers
* there is no package for registry.terraform.io/hashicorp/random 3.1.0 cached in .terraform/providers
* there is no package for registry.terraform.io/hashicorp/template 2.2.0 cached in .terraform/providers
* there is no package for registry.terraform.io/hashicorp/external 2.1.0 cached in .terraform/providers
* there is no package for registry.terraform.io/hashicorp/helm 2.0.3 cached in .terraform/providers
* there is no package for registry.terraform.io/hashicorp/kubernetes 2.0.3 cached in .terraform/providers
* there is no package for registry.terraform.io/hashicorp/local 2.1.0 cached in .terraform/providers
2021/05/12 22:07:33 [DEBUG] checking for provisioner in "."
2021/05/12 22:07:33 [DEBUG] checking for provisioner in "/usr/local/bin"
2021/05/12 22:07:33 [INFO] Failed to read plugin lock file .terraform/plugins/linux_amd64/lock.json: open .terraform/plugins/linux_amd64/lock.json: no such file or directory
2021/05/12 22:07:33 [TRACE] Meta.Backend: backend *s3.Backend does not support operations, so wrapping it in a local backend
2021/05/12 22:07:33 [INFO] backend/local: starting Apply operation
2021/05/12 22:07:33 [TRACE] backend/local: requesting state manager for workspace "default"
2021/05/12 22:07:33 [DEBUG] [aws-sdk-go] DEBUG: Request s3/ListObjects Details:
---[ REQUEST POST-SIGN ]-----------------------------
GET /?max-keys=1000&prefix=env%3A%2F HTTP/1.1
Host: fakename-terraform.s3.us-west-2.amazonaws.com
User-Agent: aws-sdk-go/1.31.9 (go1.15.6; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5
Accept-Encoding: gzip
-----------------------------------------------------
2021/05/12 22:07:33 [DEBUG] [aws-sdk-go] DEBUG: Response s3/ListObjects Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Content-Type: application/xml
Date: Wed, 12 May 2021 22:07:40 GMT
Server: AmazonS3
X-Amz-Bucket-Region: us-west-2
-----------------------------------------------------
2021/05/12 22:07:33 [DEBUG] [aws-sdk-go] <?xml version="1.0" encoding="UTF-8"?>
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>fakename-terraform</Name><Prefix>env:/</Prefix><Marker></Marker><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated></ListBucketResult>
2021/05/12 22:07:33 [TRACE] backend/local: requesting state lock for workspace "default"
2021/05/12 22:07:33 [TRACE] backend/local: reading remote state for workspace "default"
2021/05/12 22:07:33 [DEBUG] [aws-sdk-go] DEBUG: Request s3/GetObject Details:
---[ REQUEST POST-SIGN ]-----------------------------
GET /terraform/fakename-network/global/iam/fakename-aws-iam-terraform-role/terraform.tfstate HTTP/1.1
Host: fakename-terraform.s3.us-west-2.amazonaws.com
User-Agent: aws-sdk-go/1.31.9 (go1.15.6; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5
Accept-Encoding: gzip
-----------------------------------------------------
2021/05/12 22:07:34 [DEBUG] [aws-sdk-go] DEBUG: Response s3/GetObject Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 5079
Accept-Ranges: bytes
Content-Type: application/json
Date: Wed, 12 May 2021 22:07:40 GMT
Etag: "539bbb5c6cf551db388f191f33327bcf"
Last-Modified: Wed, 12 May 2021 22:06:08 GMT
Server: AmazonS3
-----------------------------------------------------
2021/05/12 22:07:34 [DEBUG] [aws-sdk-go]
2021/05/12 22:07:34 [TRACE] backend/local: retrieving local state snapshot for workspace "default"
2021/05/12 22:07:34 [TRACE] backend/local: building context for current working directory
2021/05/12 22:07:34 [TRACE] terraform.NewContext: starting
2021/05/12 22:07:34 [TRACE] terraform.NewContext: loading provider schemas
2021/05/12 22:07:34 [TRACE] LoadSchemas: retrieving schema for provider type "registry.terraform.io/hashicorp/aws"
2021-05-12T22:07:34.070Z [INFO] plugin: configuring client automatic mTLS
2021-05-12T22:07:34.139Z [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5]
2021-05-12T22:07:34.140Z [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25758
2021-05-12T22:07:34.140Z [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5
2021-05-12T22:07:34.179Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: configuring server automatic mTLS: timestamp=2021-05-12T22:07:34.179Z
2021-05-12T22:07:34.223Z [DEBUG] plugin: using plugin: version=5
2021-05-12T22:07:34.223Z [DEBUG] plugin.terraform-provider-aws_v3.33.0_x5: plugin address: address=/tmp/plugin082554993 network=unix timestamp=2021-05-12T22:07:34.223Z
2021/05/12 22:07:34 [TRACE] GRPCProvider: GetSchema
2021-05-12T22:07:34.278Z [TRACE] plugin.stdio: waiting for stdio data
2021/05/12 22:07:34 [TRACE] GRPCProvider: Close
2021-05-12T22:07:34.434Z [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-05-12T22:07:34.438Z [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25758
2021-05-12T22:07:34.438Z [DEBUG] plugin: plugin exited
2021/05/12 22:07:34 [TRACE] terraform.NewContext: complete
2021/05/12 22:07:34 [TRACE] backend/local: finished building terraform.Context
2021/05/12 22:07:34 [TRACE] backend/local: requesting interactive input, if necessary
2021/05/12 22:07:34 [TRACE] Context.Input: Prompting for provider arguments
2021/05/12 22:07:34 [TRACE] Context.Input: Provider provider.aws declared at aws_provider.tf:2,1-15
2021/05/12 22:07:34 [TRACE] Context.Input: Input for provider.aws: map[string]cty.Value{}
2021/05/12 22:07:34 [TRACE] backend/local: running validation operation
2021/05/12 22:07:34 [INFO] terraform: building graph: GraphTypeValidate
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/05/12 22:07:34 [TRACE] ConfigTransformer: Starting for path:
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.RootVariableTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding role_name as *terraform.NodeApplyableOutput
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding role_create_date as *terraform.NodeApplyableOutput
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding policy_name as *terraform.NodeApplyableOutput
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.StateTransformer
2021/05/12 22:07:34 [TRACE] StateTransformer: state is empty, so nothing to do
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.this" (*terraform.NodeValidatableResource) config from main.tf:13,1-33
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.this
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.this" (*terraform.NodeValidatableResource) config from main.tf:2,1-31
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.this
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.this" (*terraform.NodeValidatableResource) config from main.tf:23,1-49
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.this
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/05/12 22:07:34 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from aws_provider.tf:2,1-15
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.this
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.this" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.this
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_policy.this" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.this
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_role.this" (*terraform.NodeValidatableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.this
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.this
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.this
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_permissions_boundary_arn" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.attach_policy_arns" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "local.arns (expand)" references: [aws_iam_policy.this var.attach_policy_arns]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.role_name" references: [aws_iam_role.this]
2021/05/12 22:07:34 [INFO] ReferenceTransformer: reference not found: "count.index"
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.this" references: [local.arns (expand) local.arns (expand) aws_iam_role.this]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.custom_policy" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.tags" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.max_session_duration" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_description" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: []
2021/05/12 22:07:34 [INFO] ReferenceTransformer: reference not found: "count.index"
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_policy.this" references: [var.custom_policy var.custom_policy_name var.custom_policy]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.custom_policy_name" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_name" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.policy_name" references: [aws_iam_policy.this]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_role.this" references: [var.max_session_duration var.role_name var.force_detach_policies var.assume_role_policy var.tags var.role_permissions_boundary_arn var.role_description var.role_path]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_path" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.assume_role_policy" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.force_detach_policies" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.role_create_date" references: [aws_iam_role.this]
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this - *terraform.NodeValidatableResource
var.attach_policy_arns - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this - *terraform.NodeValidatableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.attachDataResourceDependenciesTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.attachDataResourceDependenciesTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this - *terraform.NodeValidatableResource
var.attach_policy_arns - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this - *terraform.NodeValidatableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this - *terraform.NodeValidatableResource
var.attach_policy_arns - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this - *terraform.NodeValidatableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this - *terraform.NodeValidatableResource
var.attach_policy_arns - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this - *terraform.NodeValidatableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_policy.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
aws_iam_policy.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
aws_iam_role.this - *terraform.NodeValidatableResource
local.arns (expand) - *terraform.nodeExpandLocal
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this - *terraform.NodeValidatableResource
var.attach_policy_arns - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this - *terraform.NodeValidatableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeValidatableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_role_policy_attachment.this - *terraform.NodeValidatableResource
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [DEBUG] Starting graph walk: walkValidate
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]"
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider)
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.assume_role_policy"
2021/05/12 22:07:34 [TRACE] vertex "var.assume_role_policy": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.assume_role_policy": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.attach_policy_arns"
2021/05/12 22:07:34 [TRACE] vertex "var.attach_policy_arns": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.attach_policy_arns": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.custom_policy_name"
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy_name": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy_name": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.force_detach_policies"
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.custom_policy"
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_permissions_boundary_arn"
2021/05/12 22:07:34 [TRACE] vertex "var.role_permissions_boundary_arn": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.role_permissions_boundary_arn": visit complete
2021/05/12 22:07:34 [TRACE] vertex "var.force_detach_policies": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_name"
2021/05/12 22:07:34 [TRACE] vertex "var.role_name": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.role_name": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.max_session_duration"
2021/05/12 22:07:34 [TRACE] vertex "var.max_session_duration": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.max_session_duration": visit complete
2021/05/12 22:07:34 [TRACE] vertex "var.force_detach_policies": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_description"
2021/05/12 22:07:34 [TRACE] vertex "var.role_description": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.role_description": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_path"
2021/05/12 22:07:34 [TRACE] vertex "var.role_path": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.role_path": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.tags"
2021-05-12T22:07:34.444Z [INFO] plugin: configuring client automatic mTLS
2021/05/12 22:07:34 [TRACE] vertex "var.tags": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.tags": visit complete
2021-05-12T22:07:34.482Z [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5]
2021-05-12T22:07:34.483Z [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25775
2021-05-12T22:07:34.483Z [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5
2021-05-12T22:07:34.548Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: configuring server automatic mTLS: timestamp=2021-05-12T22:07:34.547Z
2021-05-12T22:07:34.594Z [DEBUG] plugin: using plugin: version=5
2021-05-12T22:07:34.594Z [DEBUG] plugin.terraform-provider-aws_v3.33.0_x5: plugin address: address=/tmp/plugin073892238 network=unix timestamp=2021-05-12T22:07:34.594Z
2021/05/12 22:07:34 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only
2021/05/12 22:07:34 [TRACE] GRPCProvider: GetSchema
2021-05-12T22:07:34.676Z [TRACE] plugin.stdio: waiting for stdio data
2021/05/12 22:07:34 [TRACE] GRPCProvider: PrepareProviderConfig
2021-05-12T22:07:34.916Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:34 [WARN] Truncating attribute path of 0 diagnostics for TypeSet: timestamp=2021-05-12T22:07:34.916Z
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "aws_iam_policy.this"
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_policy.this": starting visit (*terraform.NodeValidatableResource)
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "aws_iam_role.this"
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodeValidatableResource)
2021/05/12 22:07:34 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/05/12 22:07:34 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_policy.this": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "local.arns (expand)"
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": starting visit (*terraform.nodeExpandLocal)
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": expanding dynamic subgraph
2021/05/12 22:07:34 [TRACE] Expanding local: adding local.arns as *terraform.NodeLocal
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": entering dynamic subgraph
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_role.this": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "local.arns"
2021/05/12 22:07:34 [TRACE] vertex "local.arns": starting visit (*terraform.NodeLocal)
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "output.policy_name"
2021/05/12 22:07:34 [TRACE] vertex "output.policy_name": starting visit (*terraform.NodeApplyableOutput)
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "output.role_name"
2021/05/12 22:07:34 [TRACE] vertex "output.role_name": starting visit (*terraform.NodeApplyableOutput)
2021/05/12 22:07:34 [TRACE] vertex "local.arns": visit complete
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": dynamic subgraph completed successfully
2021/05/12 22:07:34 [TRACE] vertex "local.arns (expand)": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "aws_iam_role_policy_attachment.this"
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_role_policy_attachment.this": starting visit (*terraform.NodeValidatableResource)
2021/05/12 22:07:34 [TRACE] ExecuteWriteOutput: Saving Create change for output.policy_name in changeset
2021/05/12 22:07:34 [TRACE] EvalWriteOutput: Removing output.policy_name from state (it is now null)
2021/05/12 22:07:34 [TRACE] vertex "output.policy_name": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "output.role_create_date"
2021/05/12 22:07:34 [TRACE] vertex "output.role_create_date": starting visit (*terraform.NodeApplyableOutput)
2021/05/12 22:07:34 [TRACE] ExecuteWriteOutput: Saving Create change for output.role_name in changeset
2021/05/12 22:07:34 [TRACE] EvalWriteOutput: Removing output.role_name from state (it is now null)
2021/05/12 22:07:34 [TRACE] vertex "output.role_name": visit complete
2021/05/12 22:07:34 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/05/12 22:07:34 [TRACE] ExecuteWriteOutput: Saving Create change for output.role_create_date in changeset
2021/05/12 22:07:34 [TRACE] EvalWriteOutput: Removing output.role_create_date from state (it is now null)
2021/05/12 22:07:34 [TRACE] vertex "output.role_create_date": visit complete
2021/05/12 22:07:34 [TRACE] vertex "aws_iam_role_policy_attachment.this": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)"
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/05/12 22:07:34 [TRACE] GRPCProvider: Close
2021/05/12 22:07:34 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/05/12 22:07:34 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-05-12T22:07:34.921Z [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-05-12T22:07:34.926Z [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25775
2021-05-12T22:07:34.926Z [DEBUG] plugin: plugin exited
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "root"
2021/05/12 22:07:34 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule)
2021/05/12 22:07:34 [TRACE] vertex "root": visit complete
2021/05/12 22:07:34 [INFO] backend/local: apply calling Plan
2021/05/12 22:07:34 [INFO] terraform: building graph: GraphTypePlan
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/05/12 22:07:34 [TRACE] ConfigTransformer: Starting for path:
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.RootVariableTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding role_name as *terraform.NodeApplyableOutput
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding role_create_date as *terraform.NodeApplyableOutput
2021/05/12 22:07:34 [TRACE] OutputTransformer: adding policy_name as *terraform.NodeApplyableOutput
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.StateTransformer
2021/05/12 22:07:34 [TRACE] StateTransformer: creating nodes for deposed instance objects only
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.StateTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.this (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:13,1-33
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.this (expand)
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:23,1-49
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.this (expand)
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.this (expand)" (*terraform.nodeExpandPlannableResource) config from main.tf:2,1-31
2021/05/12 22:07:34 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.this (expand)
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/05/12 22:07:34 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from aws_provider.tf:2,1-15
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.this (expand)
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_policy.this (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.this (expand)
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.this (expand)
2021/05/12 22:07:34 [DEBUG] ProviderTransformer: "aws_iam_role.this (expand)" (*terraform.nodeExpandPlannableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/05/12 22:07:34 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.this (expand)
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.this (expand)
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:07:34 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.this (expand)
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.custom_policy_name" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_path" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "local.arns (expand)" references: [aws_iam_policy.this (expand) var.attach_policy_arns]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.attach_policy_arns" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.max_session_duration" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.custom_policy" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.role_create_date" references: [aws_iam_role.this (expand)]
2021/05/12 22:07:34 [INFO] ReferenceTransformer: reference not found: "count.index"
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_policy.this (expand)" references: [var.custom_policy var.custom_policy_name var.custom_policy]
2021/05/12 22:07:34 [INFO] ReferenceTransformer: reference not found: "count.index"
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.this (expand)" references: [local.arns (expand) local.arns (expand) aws_iam_role.this (expand)]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_permissions_boundary_arn" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.force_detach_policies" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_description" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.role_name" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "aws_iam_role.this (expand)" references: [var.assume_role_policy var.tags var.role_description var.role_path var.max_session_duration var.role_name var.force_detach_policies var.role_permissions_boundary_arn]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.tags" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "var.assume_role_policy" references: []
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.role_name" references: [aws_iam_role.this (expand)]
2021/05/12 22:07:34 [DEBUG] ReferenceTransformer: "output.policy_name" references: [aws_iam_policy.this (expand)]
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
var.attach_policy_arns - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021/05/12 22:07:34 [TRACE] AttachDependenciesTransformer: aws_iam_role_policy_attachment.this depends on [aws_iam_policy.this aws_iam_role.this]
2021/05/12 22:07:34 [TRACE] AttachDependenciesTransformer: aws_iam_policy.this depends on []
2021/05/12 22:07:34 [TRACE] AttachDependenciesTransformer: aws_iam_role.this depends on []
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.attachDataResourceDependenciesTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.attachDataResourceDependenciesTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021/05/12 22:07:34 [TRACE] ForcedCBDTransformer: "aws_iam_role.this (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021/05/12 22:07:34 [TRACE] ForcedCBDTransformer: "aws_iam_policy.this (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021/05/12 22:07:34 [TRACE] ForcedCBDTransformer: "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandPlannableResource) has no CBD descendent, so skipping
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
var.attach_policy_arns - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
var.attach_policy_arns - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
var.attach_policy_arns - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/05/12 22:07:34 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
local.arns (expand) - *terraform.nodeExpandLocal
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
var.attach_policy_arns - *terraform.NodeRootVariable
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this (expand) - *terraform.nodeExpandPlannableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this (expand) - *terraform.nodeExpandPlannableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandPlannableResource
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:07:34 [DEBUG] Starting graph walk: walkPlan
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.custom_policy"
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_path"
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.custom_policy_name"
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.tags"
2021/05/12 22:07:34 [TRACE] vertex "var.tags": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.force_detach_policies"
2021/05/12 22:07:34 [TRACE] vertex "var.force_detach_policies": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.assume_role_policy"
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_name"
2021/05/12 22:07:34 [TRACE] vertex "var.assume_role_policy": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.assume_role_policy": visit complete
2021/05/12 22:07:34 [TRACE] vertex "var.tags": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.attach_policy_arns"
2021/05/12 22:07:34 [TRACE] vertex "var.attach_policy_arns": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.attach_policy_arns": visit complete
2021/05/12 22:07:34 [TRACE] vertex "var.role_path": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.role_path": visit complete
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy_name": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.custom_policy_name": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.max_session_duration"
2021/05/12 22:07:34 [TRACE] vertex "var.max_session_duration": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.max_session_duration": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_description"
2021/05/12 22:07:34 [TRACE] vertex "var.role_description": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.role_description": visit complete
2021/05/12 22:07:34 [TRACE] vertex "var.force_detach_policies": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "var.role_permissions_boundary_arn"
2021/05/12 22:07:34 [TRACE] vertex "var.role_permissions_boundary_arn": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:07:34 [TRACE] vertex "var.role_permissions_boundary_arn": visit complete
2021/05/12 22:07:34 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]"
2021/05/12 22:07:34 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider)
2021/05/12 22:07:34 [TRACE] vertex "var.role_name": starting visit (*terraform.NodeRootVariable)
2021-05-12T22:07:34.933Z [INFO] plugin: configuring client automatic mTLS
2021/05/12 22:07:34 [TRACE] vertex "var.role_name": visit complete
2021-05-12T22:07:34.962Z [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5]
2021-05-12T22:07:34.963Z [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25792
2021-05-12T22:07:34.963Z [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5
2021-05-12T22:07:35.006Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: configuring server automatic mTLS: timestamp=2021-05-12T22:07:35.006Z
2021-05-12T22:07:35.054Z [DEBUG] plugin: using plugin: version=5
2021-05-12T22:07:35.055Z [DEBUG] plugin.terraform-provider-aws_v3.33.0_x5: plugin address: network=unix address=/tmp/plugin328611739 timestamp=2021-05-12T22:07:35.054Z
2021/05/12 22:07:35 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"]
2021-05-12T22:07:35.118Z [TRACE] plugin.stdio: waiting for stdio data
2021/05/12 22:07:35 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only
2021/05/12 22:07:35 [TRACE] GRPCProvider: GetSchema
2021/05/12 22:07:35 [TRACE] GRPCProvider: Configure
2021-05-12T22:07:35.214Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:35 [INFO] AWS Auth provider used: "StaticProvider": timestamp=2021-05-12T22:07:35.214Z
2021-05-12T22:07:35.215Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:35 [DEBUG] Trying to get account information via iam:GetUser: timestamp=2021-05-12T22:07:35.214Z
2021-05-12T22:07:35.215Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:35 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 33
Accept-Encoding: gzip
Action=GetUser&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:07:35.215Z
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "output.policy_name" is waiting for "aws_iam_policy.this (expand)"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "output.role_create_date" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "aws_iam_policy.this (expand)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.this (expand)" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "local.arns (expand)" is waiting for "aws_iam_policy.this (expand)"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "output.policy_name"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "aws_iam_role.this (expand)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)"
2021/05/12 22:07:39 [TRACE] dag/walk: vertex "output.role_name" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "output.role_create_date" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "output.role_name" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "output.policy_name"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "aws_iam_policy.this (expand)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "aws_iam_role.this (expand)" is waiting for "provider[\"registry.terraform.io/hashicorp/aws\"]"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.this (expand)" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "output.policy_name" is waiting for "aws_iam_policy.this (expand)"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "local.arns (expand)" is waiting for "aws_iam_policy.this (expand)"
2021/05/12 22:07:44 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)"
2021-05-12T22:07:45.794Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 678
Content-Type: text/xml
Date: Wed, 12 May 2021 22:07:50 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:07:45.794Z
2021-05-12T22:07:45.794Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] [aws-sdk-go] <GetUserResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetUserResult>
<User>
<Path>/</Path>
<PasswordLastUsed>2021-02-24T05:21:29Z</PasswordLastUsed>
<Arn>arn:aws:iam::000000000001:user/tmp-rce-user</Arn>
<UserName>tmp-rce-user</UserName>
<UserId>AIDAZLO5RQSBZU26DOGE5</UserId>
<CreateDate>2021-02-13T02:11:43Z</CreateDate>
<Tags>
<member>
<Value>test123@test.com</Value>
<Key>owner</Key>
</member>
</Tags>
</User>
</GetUserResult>
<ResponseMetadata>
<RequestId>6f14a9a9-9eef-4542-a882-f027a6786c2f</RequestId>
</ResponseMetadata>
</GetUserResponse>: timestamp=2021-05-12T22:07:45.794Z
2021/05/12 22:07:45 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_policy.this (expand)"
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this (expand)": expanding dynamic subgraph
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_role.this (expand)"
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this (expand)": entering dynamic subgraph
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_policy.this"
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this": starting visit (*terraform.NodePlannableResource)
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this (expand)": expanding dynamic subgraph
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this (expand)": entering dynamic subgraph
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_role.this"
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodePlannableResource)
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this": expanding dynamic subgraph
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/05/12 22:07:45 [TRACE] ResourceCountTransformer: adding aws_iam_role.this as *terraform.NodePlannableResourceInstance
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
aws_iam_role.this - *terraform.NodePlannableResourceInstance
------
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.role_path"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.max_session_duration"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.role_name"
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this": expanding dynamic subgraph
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.force_detach_policies"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.assume_role_policy"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.tags"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.role_permissions_boundary_arn"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.role_description"
2021/05/12 22:07:45 [DEBUG] ReferenceTransformer: "aws_iam_role.this" references: []
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.RootTransformer
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this": entering dynamic subgraph
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_role.this"
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodePlannableResourceInstance)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/05/12 22:07:45 [TRACE] ResourceCountTransformer: adding aws_iam_policy.this[0] as *terraform.NodePlannableResourceInstance
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
aws_iam_policy.this[0] - *terraform.NodePlannableResourceInstance
------
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/05/12 22:07:45 [TRACE] ReadResourceInstanceState: reading state for aws_iam_role.this
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.custom_policy"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.custom_policy"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "count.index"
2021/05/12 22:07:45 [INFO] ReferenceTransformer: reference not found: "var.custom_policy_name"
2021/05/12 22:07:45 [DEBUG] ReferenceTransformer: "aws_iam_policy.this[0]" references: []
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/05/12 22:07:45 [TRACE] Executing graph transform *terraform.RootTransformer
2021/05/12 22:07:45 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this": entering dynamic subgraph
2021/05/12 22:07:45 [TRACE] dag/walk: visiting "aws_iam_policy.this[0]"
2021/05/12 22:07:45 [TRACE] vertex "aws_iam_policy.this[0]": starting visit (*terraform.NodePlannableResourceInstance)
2021/05/12 22:07:45 [TRACE] ReadResourceInstanceState: reading state for aws_iam_policy.this[0]
2021/05/12 22:07:45 [TRACE] UpgradeResourceState: schema version of aws_iam_policy.this[0] is still 0; calling provider "aws" for any other minor fixups
2021/05/12 22:07:45 [TRACE] GRPCProvider: UpgradeResourceState
2021/05/12 22:07:45 [TRACE] UpgradeResourceState: schema version of aws_iam_role.this is still 0; calling provider "aws" for any other minor fixups
2021/05/12 22:07:45 [TRACE] GRPCProvider: UpgradeResourceState
2021/05/12 22:07:45 [TRACE] GRPCProvider: ReadResource
2021/05/12 22:07:45 [TRACE] GRPCProvider: ReadResource
aws_iam_policy.this[0]: Refreshing state... [id=arn:aws:iam::000000000001:policy/terraform-usage-policy]
aws_iam_role.this: Refreshing state... [id=terraform-usage-role]
2021-05-12T22:07:45.809Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] Getting IAM Policy: {
PolicyArn: "arn:aws:iam::000000000001:policy/terraform-usage-policy"
}: timestamp=2021-05-12T22:07:45.809Z
2021-05-12T22:07:45.809Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-12T22:07:45.809Z
2021-05-12T22:07:45.810Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicy Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 113
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=GetPolicy&PolicyArn=arn%3Aaws%3Aiam%3A%3A000000000001%3Apolicy%2Fterraform-usage-policy&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:07:45.810Z
2021-05-12T22:07:45.811Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:45 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 63
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=GetRole&RoleName=terraform-usage-role&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:07:45.810Z
2021-05-12T22:07:47.198Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicy Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 781
Content-Type: text/xml
Date: Wed, 12 May 2021 22:07:52 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:07:47.197Z
2021-05-12T22:07:47.198Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] <GetPolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetPolicyResult>
<Policy>
<PermissionsBoundaryUsageCount>0</PermissionsBoundaryUsageCount>
<Path>/</Path>
<UpdateDate>2021-02-16T07:39:56Z</UpdateDate>
<PolicyId>ANPAZLO5RQSBZR3GTKQVH</PolicyId>
<DefaultVersionId>v7</DefaultVersionId>
<PolicyName>terraform-usage-policy</PolicyName>
<IsAttachable>true</IsAttachable>
<AttachmentCount>1</AttachmentCount>
<Arn>arn:aws:iam::000000000001:policy/terraform-usage-policy</Arn>
<CreateDate>2021-02-16T02:46:15Z</CreateDate>
<Tags/>
</Policy>
</GetPolicyResult>
<ResponseMetadata>
<RequestId>2ebacf4c-2927-4eb0-9b48-67692e2fedd0</RequestId>
</ResponseMetadata>
</GetPolicyResponse>: timestamp=2021-05-12T22:07:47.198Z
2021-05-12T22:07:47.198Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] Getting IAM Policy Version: {
PolicyArn: "arn:aws:iam::000000000001:policy/terraform-usage-policy",
VersionId: "v7"
}: timestamp=2021-05-12T22:07:47.198Z
2021-05-12T22:07:47.198Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] Waiting for state to become: [success]: timestamp=2021-05-12T22:07:47.198Z
2021-05-12T22:07:47.200Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetPolicyVersion Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 133
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=GetPolicyVersion&PolicyArn=arn%3Aaws%3Aiam%3A%3A000000000001%3Apolicy%2Fterraform-usage-policy&Version=2010-05-08&VersionId=v7
-----------------------------------------------------: timestamp=2021-05-12T22:07:47.200Z
2021-05-12T22:07:47.239Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Content-Type: text/xml
Date: Wed, 12 May 2021 22:07:52 GMT
Vary: accept-encoding
-----------------------------------------------------: timestamp=2021-05-12T22:07:47.239Z
2021-05-12T22:07:47.240Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetRoleResult>
<Role>
<Path>/</Path>
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22shedrivesmecrazy%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2Fonelogin_ad_association%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%2C%22Condition%22%3A%7B%22ForAllValues%3AStringEqualsIgnoreCase%22%3A%7B%22SAML%3Asub%22%3A%5B%22fakename-network_Admin%22%2C%22fakename-network_Superadmin%22%2C%22fakename-network_Power%22%2C%22fakename-network_SysEng%22%2C%22fakename-network_Standard%22%5D%7D%7D%7D%2C%7B%22Sid%22%3A%22likenooneelse%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%5B%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SysEng%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-NetEng%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Power%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SuperAdmin%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Standard%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Admin%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%2C%7B%22Sid%22%3A%22andicanthelpmyself%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%5B%22arn%3Aaws%3Aiam%3A%3A000000000009%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000004%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000007%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000008%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000011%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000012%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A00000000005%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000010%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000003%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000002%3Aroot%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
<MaxSessionDuration>3600</MaxSessionDuration>
<RoleId>AROAZLO5RQSBQLREIIMOZ</RoleId>
<RoleLastUsed>
<LastUsedDate>2021-05-12T21:38:54Z</LastUsedDate>
<Region>us-west-2</Region>
</RoleLastUsed>
<RoleName>terraform-usage-role</RoleName>
<Description>terraform usage role</Description>
<Arn>arn:aws:iam::000000000001:role/terraform-usage-role</Arn>
<CreateDate>2021-02-16T02:46:15Z</CreateDate>
<Tags>
<member>
<Value>test123@test.com</Value>
<Key>owner</Key>
</member>
</Tags>
</Role>
</GetRoleResult>
<ResponseMetadata>
<RequestId>f51fc35f-94fa-432e-9006-addea6188e01</RequestId>
</ResponseMetadata>
</GetRoleResponse>: timestamp=2021-05-12T22:07:47.239Z
2021-05-12T22:07:47.241Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:47 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 72
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=ListRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:07:47.241Z
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "output.role_name" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "local.arns (expand)" is waiting for "aws_iam_policy.this (expand)"
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "output.role_create_date" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "output.policy_name" is waiting for "aws_iam_policy.this (expand)"
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "output.policy_name"
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.this (expand)" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)"
2021/05/12 22:07:49 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)"
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)"
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "output.role_name" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "output.policy_name"
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "output.role_create_date" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "local.arns (expand)" is waiting for "aws_iam_policy.this (expand)"
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "aws_iam_role_policy_attachment.this (expand)" is waiting for "aws_iam_role.this (expand)"
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)"
2021/05/12 22:07:54 [TRACE] dag/walk: vertex "output.policy_name" is waiting for "aws_iam_policy.this (expand)"
2021-05-12T22:07:57.747Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 323
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:02 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:07:57.746Z
2021-05-12T22:07:57.747Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<PolicyNames/>
</ListRolePoliciesResult>
<ResponseMetadata>
<RequestId>34fc4627-c5f9-480c-a9c8-ec4f44c9c735</RequestId>
</ResponseMetadata>
</ListRolePoliciesResponse>: timestamp=2021-05-12T22:07:57.747Z
2021-05-12T22:07:57.749Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 80
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:07:57.749Z
2021-05-12T22:07:57.751Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetPolicyVersion Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:03 GMT
Vary: accept-encoding
-----------------------------------------------------: timestamp=2021-05-12T22:07:57.750Z
2021-05-12T22:07:57.751Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:57 [DEBUG] [aws-sdk-go] <GetPolicyVersionResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetPolicyVersionResult>
<PolicyVersion>
<VersionId>v7</VersionId>
<IsDefaultVersion>true</IsDefaultVersion>
<Document>%7B%0A%20%20%20%20%22Version%22%3A%20%222012-10-17%22%2C%0A%20%20%20%20%22Statement%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Sid%22%3A%20%22first%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Action%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3AListBucket%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3AGetBucketVersioning%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Resource%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22arn%3Aaws%3As3%3A%3A%3Afakename-terraform%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%0A%20%20%20%20%20%20%20%20%7D%2C%0A%20%20%20%20%20%20%20%20%7B%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Sid%22%3A%20%22second%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Effect%22%3A%20%22Allow%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Action%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3ADeleteObject%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3AGetObject%22%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22s3%3APutObject%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%2C%0A%20%20%20%20%20%20%20%20%20%20%20%20%22Resource%22%3A%20%5B%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%22arn%3Aaws%3As3%3A%3A%3Afakename-terraform%2F%2A%22%0A%20%20%20%20%20%20%20%20%20%20%20%20%5D%0A%20%20%20%20%20%20%20%20%7D%0A%20%20%20%20%5D%0A%7D</Document>
<CreateDate>2021-02-16T07:39:56Z</CreateDate>
</PolicyVersion>
</GetPolicyVersionResult>
<ResponseMetadata>
<RequestId>3772f383-e16e-4994-a9fa-49675eb36191</RequestId>
</ResponseMetadata>
</GetPolicyVersionResponse>: timestamp=2021-05-12T22:07:57.750Z
2021/05/12 22:07:57 [TRACE] EvalWriteState: using RefreshState for aws_iam_policy.this[0]
2021/05/12 22:07:57 [TRACE] EvalWriteState: recording 0 dependencies for aws_iam_policy.this[0]
2021/05/12 22:07:57 [TRACE] EvalWriteState: writing current state object for aws_iam_policy.this[0]
2021/05/12 22:07:57 [TRACE] Re-validating config for "aws_iam_policy.this[0]"
2021/05/12 22:07:57 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/05/12 22:07:57 [TRACE] GRPCProvider: PlanResourceChange
2021/05/12 22:07:57 [TRACE] EvalWriteState: writing current state object for aws_iam_policy.this[0]
2021/05/12 22:07:57 [TRACE] EvalWriteDiff: recorded NoOp change for aws_iam_policy.this[0]
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this[0]": visit complete
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this": dynamic subgraph completed successfully
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this": visit complete
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this (expand)": dynamic subgraph completed successfully
2021/05/12 22:07:57 [TRACE] vertex "aws_iam_policy.this (expand)": visit complete
2021/05/12 22:07:57 [TRACE] dag/walk: visiting "local.arns (expand)"
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": starting visit (*terraform.nodeExpandLocal)
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": expanding dynamic subgraph
2021/05/12 22:07:57 [TRACE] Expanding local: adding local.arns as *terraform.NodeLocal
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": entering dynamic subgraph
2021/05/12 22:07:57 [TRACE] dag/walk: visiting "output.policy_name"
2021/05/12 22:07:57 [TRACE] vertex "output.policy_name": starting visit (*terraform.NodeApplyableOutput)
2021/05/12 22:07:57 [TRACE] dag/walk: visiting "local.arns"
2021/05/12 22:07:57 [TRACE] vertex "local.arns": starting visit (*terraform.NodeLocal)
2021/05/12 22:07:57 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.policy_name in changeset
2021/05/12 22:07:57 [TRACE] EvalWriteOutput: Saving value for output.policy_name in state
2021/05/12 22:07:57 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.policy_name in changeset
2021/05/12 22:07:57 [TRACE] EvalWriteOutput: Saving value for output.policy_name in state
2021/05/12 22:07:57 [TRACE] vertex "output.policy_name": visit complete
2021/05/12 22:07:57 [TRACE] vertex "local.arns": visit complete
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": dynamic subgraph completed successfully
2021/05/12 22:07:57 [TRACE] vertex "local.arns (expand)": visit complete
2021-05-12T22:07:58.855Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:58 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 557
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:04 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:07:58.855Z
2021-05-12T22:07:58.856Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:58 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies>
<member>
<PolicyArn>arn:aws:iam::000000000001:policy/terraform-usage-policy</PolicyArn>
<PolicyName>terraform-usage-policy</PolicyName>
</member>
</AttachedPolicies>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>451882fc-9c32-42fc-bdbc-68017d26c8a3</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-05-12T22:07:58.855Z
2021/05/12 22:07:58 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for aws_iam_role.this during refresh.
- .assume_role_policy: was cty.StringVal("{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"shedrivesmecrazy\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::000000000001:role/onelogin_ad_association\"},\"Action\":\"sts:AssumeRole\",\"Condition\":{\"ForAllValues:StringEqualsIgnoreCase\":{\"SAML:sub\":[\"fakename-network_Admin\",\"fakename-network_Superadmin\",\"fakename-network_Power\",\"fakename-network_SysEng\",\"fakename-network_Standard\"]}}},{\"Sid\":\"likenooneelse\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000001:role/GL-NetEng\",\"arn:aws:iam::000000000001:role/GL-Admin\",\"arn:aws:iam::000000000001:role/GL-SuperAdmin\",\"arn:aws:iam::000000000001:role/GL-SysEng\",\"arn:aws:iam::000000000001:role/GL-Standard\",\"arn:aws:iam::000000000001:role/GL-Power\"]},\"Action\":\"sts:AssumeRole\"},{\"Sid\":\"andicanthelpmyself\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000011:root\",\"arn:aws:iam::00000000005:root\",\"arn:aws:iam::000000000002:root\",\"arn:aws:iam::000000000010:root\",\"arn:aws:iam::000000000012:root\",\"arn:aws:iam::000000000004:root\",\"arn:aws:iam::000000000007:root\",\"arn:aws:iam::000000000009:root\",\"arn:aws:iam::000000000008:root\",\"arn:aws:iam::000000000003:root\",\"arn:aws:iam::000000000001:root\"]},\"Action\":\"sts:AssumeRole\"}]}"), but now cty.StringVal("{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"shedrivesmecrazy\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::000000000001:role/onelogin_ad_association\"},\"Action\":\"sts:AssumeRole\",\"Condition\":{\"ForAllValues:StringEqualsIgnoreCase\":{\"SAML:sub\":[\"fakename-network_Admin\",\"fakename-network_Superadmin\",\"fakename-network_Power\",\"fakename-network_SysEng\",\"fakename-network_Standard\"]}}},{\"Sid\":\"likenooneelse\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000001:role/GL-SysEng\",\"arn:aws:iam::000000000001:role/GL-NetEng\",\"arn:aws:iam::000000000001:role/GL-Power\",\"arn:aws:iam::000000000001:role/GL-SuperAdmin\",\"arn:aws:iam::000000000001:role/GL-Standard\",\"arn:aws:iam::000000000001:role/GL-Admin\"]},\"Action\":\"sts:AssumeRole\"},{\"Sid\":\"andicanthelpmyself\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000009:root\",\"arn:aws:iam::000000000004:root\",\"arn:aws:iam::000000000007:root\",\"arn:aws:iam::000000000008:root\",\"arn:aws:iam::000000000011:root\",\"arn:aws:iam::000000000012:root\",\"arn:aws:iam::000000000006:root\",\"arn:aws:iam::000000000010:root\",\"arn:aws:iam::000000000001:root\",\"arn:aws:iam::000000000003:root\",\"arn:aws:iam::000000000002:root\"]},\"Action\":\"sts:AssumeRole\"}]}")
2021/05/12 22:07:58 [TRACE] EvalWriteState: using RefreshState for aws_iam_role.this
2021/05/12 22:07:58 [TRACE] EvalWriteState: recording 0 dependencies for aws_iam_role.this
2021/05/12 22:07:58 [TRACE] EvalWriteState: writing current state object for aws_iam_role.this
2021/05/12 22:07:58 [TRACE] Re-validating config for "aws_iam_role.this"
2021/05/12 22:07:58 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/05/12 22:07:58 [TRACE] GRPCProvider: PlanResourceChange
2021/05/12 22:07:58 [TRACE] EvalWriteState: writing current state object for aws_iam_role.this
2021/05/12 22:07:58 [TRACE] EvalWriteDiff: recorded Update change for aws_iam_role.this
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this": visit complete
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this": dynamic subgraph completed successfully
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this": visit complete
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this (expand)": dynamic subgraph completed successfully
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role.this (expand)": visit complete
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "output.role_name"
2021/05/12 22:07:58 [TRACE] vertex "output.role_name": starting visit (*terraform.NodeApplyableOutput)
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "aws_iam_role_policy_attachment.this (expand)"
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": starting visit (*terraform.nodeExpandPlannableResource)
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": expanding dynamic subgraph
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": entering dynamic subgraph
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "output.role_create_date"
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "aws_iam_role_policy_attachment.this"
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this": starting visit (*terraform.NodePlannableResource)
2021/05/12 22:07:58 [TRACE] vertex "output.role_create_date": starting visit (*terraform.NodeApplyableOutput)
2021/05/12 22:07:58 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_name in changeset
2021/05/12 22:07:58 [TRACE] EvalWriteOutput: Saving value for output.role_name in state
2021/05/12 22:07:58 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_name in changeset
2021/05/12 22:07:58 [TRACE] EvalWriteOutput: Saving value for output.role_name in state
2021/05/12 22:07:58 [TRACE] vertex "output.role_name": visit complete
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this": expanding dynamic subgraph
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.ResourceCountTransformer
2021/05/12 22:07:58 [TRACE] ResourceCountTransformer: adding aws_iam_role_policy_attachment.this[0] as *terraform.NodePlannableResourceInstance
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.ResourceCountTransformer with new graph:
aws_iam_role_policy_attachment.this[0] - *terraform.NodePlannableResourceInstance
------
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.OrphanResourceInstanceCountTransformer
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.OrphanResourceInstanceCountTransformer (no changes)
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/05/12 22:07:58 [INFO] ReferenceTransformer: reference not found: "local.arns"
2021/05/12 22:07:58 [INFO] ReferenceTransformer: reference not found: "local.arns"
2021/05/12 22:07:58 [INFO] ReferenceTransformer: reference not found: "count.index"
2021/05/12 22:07:58 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.this[0]" references: []
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.ReferenceTransformer (no changes)
2021/05/12 22:07:58 [TRACE] Executing graph transform *terraform.RootTransformer
2021/05/12 22:07:58 [TRACE] Completed graph transform *terraform.RootTransformer (no changes)
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this": entering dynamic subgraph
2021/05/12 22:07:58 [TRACE] dag/walk: visiting "aws_iam_role_policy_attachment.this[0]"
2021/05/12 22:07:58 [TRACE] vertex "aws_iam_role_policy_attachment.this[0]": starting visit (*terraform.NodePlannableResourceInstance)
2021/05/12 22:07:58 [TRACE] ReadResourceInstanceState: reading state for aws_iam_role_policy_attachment.this[0]
2021/05/12 22:07:58 [TRACE] UpgradeResourceState: schema version of aws_iam_role_policy_attachment.this[0] is still 0; calling provider "aws" for any other minor fixups
2021/05/12 22:07:58 [TRACE] GRPCProvider: UpgradeResourceState
2021/05/12 22:07:58 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_create_date in changeset
2021/05/12 22:07:58 [TRACE] EvalWriteOutput: Saving value for output.role_create_date in state
2021/05/12 22:07:58 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_create_date in changeset
2021/05/12 22:07:58 [TRACE] EvalWriteOutput: Saving value for output.role_create_date in state
2021/05/12 22:07:58 [TRACE] vertex "output.role_create_date": visit complete
2021/05/12 22:07:58 [TRACE] GRPCProvider: ReadResource
aws_iam_role_policy_attachment.this[0]: Refreshing state... [id=terraform-usage-role-20210216024614902500000001]
2021-05-12T22:07:58.873Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:07:58 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 80
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:07:58.873Z
2021/05/12 22:07:59 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)"
2021/05/12 22:07:59 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)"
2021/05/12 22:08:03 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "aws_iam_role_policy_attachment.this (expand)"
2021/05/12 22:08:04 [TRACE] dag/walk: vertex "root" is waiting for "meta.count-boundary (EachMode fixup)"
2021/05/12 22:08:04 [TRACE] dag/walk: vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)" is waiting for "aws_iam_role_policy_attachment.this (expand)"
2021/05/12 22:08:08 [TRACE] dag/walk: vertex "meta.count-boundary (EachMode fixup)" is waiting for "aws_iam_role_policy_attachment.this (expand)"
2021-05-12T22:08:09.422Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 557
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:14 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:08:09.421Z
2021-05-12T22:08:09.422Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies>
<member>
<PolicyArn>arn:aws:iam::000000000001:policy/terraform-usage-policy</PolicyArn>
<PolicyName>terraform-usage-policy</PolicyName>
</member>
</AttachedPolicies>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>37385c4c-61e1-463e-80e1-607680b40c0e</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-05-12T22:08:09.422Z
2021/05/12 22:08:09 [TRACE] EvalWriteState: using RefreshState for aws_iam_role_policy_attachment.this[0]
2021/05/12 22:08:09 [TRACE] EvalWriteState: recording 2 dependencies for aws_iam_role_policy_attachment.this[0]
2021/05/12 22:08:09 [TRACE] EvalWriteState: writing current state object for aws_iam_role_policy_attachment.this[0]
2021/05/12 22:08:09 [TRACE] Re-validating config for "aws_iam_role_policy_attachment.this[0]"
2021/05/12 22:08:09 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/05/12 22:08:09 [TRACE] GRPCProvider: PlanResourceChange
2021/05/12 22:08:09 [TRACE] EvalWriteState: writing current state object for aws_iam_role_policy_attachment.this[0]
2021/05/12 22:08:09 [TRACE] EvalWriteDiff: recorded NoOp change for aws_iam_role_policy_attachment.this[0]
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this[0]": visit complete
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this": dynamic subgraph completed successfully
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this": visit complete
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": dynamic subgraph completed successfully
2021/05/12 22:08:09 [TRACE] vertex "aws_iam_role_policy_attachment.this (expand)": visit complete
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)"
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/05/12 22:08:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/05/12 22:08:09 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021/05/12 22:08:09 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/05/12 22:08:09 [TRACE] GRPCProvider: Close
2021-05-12T22:08:09.432Z [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-05-12T22:08:09.438Z [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25792
2021-05-12T22:08:09.438Z [DEBUG] plugin: plugin exited
2021/05/12 22:08:09 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "root"
2021/05/12 22:08:09 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule)
2021/05/12 22:08:09 [TRACE] vertex "root": visit complete
2021/05/12 22:08:09 [INFO] backend/local: apply calling Apply
2021/05/12 22:08:09 [INFO] terraform: building graph: GraphTypeApply
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ConfigTransformer
2021/05/12 22:08:09 [TRACE] ConfigTransformer: Starting for path:
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ConfigTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.RootVariableTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.RootVariableTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ModuleVariableTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ModuleVariableTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.LocalTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.LocalTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
local.arns (expand) - *terraform.nodeExpandLocal
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.OutputTransformer
2021/05/12 22:08:09 [TRACE] OutputTransformer: adding role_name as *terraform.NodeApplyableOutput
2021/05/12 22:08:09 [TRACE] OutputTransformer: adding role_create_date as *terraform.NodeApplyableOutput
2021/05/12 22:08:09 [TRACE] OutputTransformer: adding policy_name as *terraform.NodeApplyableOutput
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.OutputTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.DiffTransformer
2021/05/12 22:08:09 [TRACE] DiffTransformer starting
2021/05/12 22:08:09 [TRACE] DiffTransformer: found NoOp change for aws_iam_policy.this[0]
2021/05/12 22:08:09 [TRACE] DiffTransformer: found Update change for aws_iam_role.this
2021/05/12 22:08:09 [TRACE] DiffTransformer: aws_iam_role.this will be represented by aws_iam_role.this
2021/05/12 22:08:09 [TRACE] DiffTransformer: found NoOp change for aws_iam_role_policy_attachment.this[0]
2021/05/12 22:08:09 [TRACE] DiffTransformer complete
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.DiffTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.AttachStateTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.AttachStateTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.OrphanOutputTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.OrphanOutputTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.AttachResourceConfigTransformer
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandApplyableResource) config from main.tf:23,1-49
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role_policy_attachment.this (expand)
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_policy.this (expand)" (*terraform.nodeExpandApplyableResource) config from main.tf:13,1-33
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_policy.this (expand)
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.this" (*terraform.NodeApplyableResourceInstance) config from main.tf:2,1-31
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.this
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching to "aws_iam_role.this (expand)" (*terraform.nodeExpandApplyableResource) config from main.tf:2,1-31
2021/05/12 22:08:09 [TRACE] AttachResourceConfigTransformer: attaching provider meta configs to aws_iam_role.this (expand)
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.AttachResourceConfigTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.MissingProvisionerTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.MissingProvisionerTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ProvisionerTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ProvisionerTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.graphTransformerMulti
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderConfigTransformer
2021/05/12 22:08:09 [TRACE] ProviderConfigTransformer: attaching to "provider[\"registry.terraform.io/hashicorp/aws\"]" provider configuration from aws_provider.tf:2,1-15
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderConfigTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.MissingProviderTransformer
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.MissingProviderTransformer (no changes)
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ProviderTransformer
2021/05/12 22:08:09 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role_policy_attachment.this (expand)
2021/05/12 22:08:09 [DEBUG] ProviderTransformer: "aws_iam_role_policy_attachment.this (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:08:09 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.this
2021/05/12 22:08:09 [DEBUG] ProviderTransformer: "aws_iam_role.this" (*terraform.NodeApplyableResourceInstance) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:08:09 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_role.this (expand)
2021/05/12 22:08:09 [DEBUG] ProviderTransformer: "aws_iam_role.this (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:08:09 [TRACE] ProviderTransformer: exact match for provider["registry.terraform.io/hashicorp/aws"] serving aws_iam_policy.this (expand)
2021/05/12 22:08:09 [DEBUG] ProviderTransformer: "aws_iam_policy.this (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ProviderTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.PruneProviderTransformer
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.PruneProviderTransformer (no changes)
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Executing graph transform *terraform.ParentProviderTransformer
2021/05/12 22:08:09 [TRACE] (graphTransformerMulti) Completed graph transform *terraform.ParentProviderTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.graphTransformerMulti with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.RemovedModuleTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.RemovedModuleTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.AttachSchemaTransformer
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_policy.this (expand)
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role_policy_attachment.this (expand)
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching provider config schema to provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.this (expand)
2021/05/12 22:08:09 [TRACE] AttachSchemaTransformer: attaching resource schema to aws_iam_role.this
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.AttachSchemaTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ModuleExpansionTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ModuleExpansionTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ReferenceTransformer
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.role_path" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.max_session_duration" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "local.arns (expand)" references: [aws_iam_policy.this (expand) var.attach_policy_arns]
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "provider[\"registry.terraform.io/hashicorp/aws\"]" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "aws_iam_policy.this (expand)" references: [var.custom_policy]
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "aws_iam_role_policy_attachment.this (expand)" references: [local.arns (expand)]
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.tags" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.force_detach_policies" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "output.policy_name" references: [aws_iam_policy.this (expand)]
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.custom_policy" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.custom_policy_name" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.role_name" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.role_description" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "output.role_name" references: [aws_iam_role.this aws_iam_role.this aws_iam_role.this (expand)]
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "aws_iam_role.this" references: [var.max_session_duration var.role_name var.force_detach_policies var.role_permissions_boundary_arn var.assume_role_policy var.tags var.role_description var.role_path]
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "aws_iam_role.this (expand)" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.role_permissions_boundary_arn" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.assume_role_policy" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "var.attach_policy_arns" references: []
2021/05/12 22:08:09 [DEBUG] ReferenceTransformer: "output.role_create_date" references: [aws_iam_role.this aws_iam_role.this aws_iam_role.this (expand)]
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ReferenceTransformer with new graph:
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.custom_policy - *terraform.NodeRootVariable
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
aws_iam_role_policy_attachment.this (expand) - *terraform.nodeExpandApplyableResource
local.arns (expand) - *terraform.nodeExpandLocal
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
local.arns (expand) - *terraform.nodeExpandLocal
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
var.attach_policy_arns - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
aws_iam_policy.this (expand) - *terraform.nodeExpandApplyableResource
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.AttachDependenciesTransformer
2021/05/12 22:08:09 [TRACE] AttachDependenciesTransformer: aws_iam_role.this depends on []
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.AttachDependenciesTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.ForcedCBDTransformer
2021/05/12 22:08:09 [TRACE] ForcedCBDTransformer: "aws_iam_role.this" (*terraform.NodeApplyableResourceInstance) has no CBD descendent, so skipping
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.ForcedCBDTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.DestroyEdgeTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.DestroyEdgeTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CBDEdgeTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CBDEdgeTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.pruneUnusedNodesTransformer
2021/05/12 22:08:09 [DEBUG] pruneUnusedNodes: aws_iam_role_policy_attachment.this (expand) is no longer needed, removing
2021/05/12 22:08:09 [DEBUG] pruneUnusedNodes: local.arns (expand) is no longer needed, removing
2021/05/12 22:08:09 [DEBUG] pruneUnusedNodes: aws_iam_policy.this (expand) is no longer needed, removing
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.pruneUnusedNodesTransformer with new graph:
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.TargetsTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.TargetsTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CountBoundaryTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CountBoundaryTransformer with new graph:
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CloseProviderTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CloseProviderTransformer with new graph:
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CloseProvisionerTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CloseProvisionerTransformer (no changes)
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.CloseRootModuleTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.CloseRootModuleTransformer with new graph:
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [TRACE] Executing graph transform *terraform.TransitiveReductionTransformer
2021/05/12 22:08:09 [TRACE] Completed graph transform *terraform.TransitiveReductionTransformer with new graph:
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
var.assume_role_policy - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
aws_iam_role.this (expand) - *terraform.nodeExpandApplyableResource
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
output.role_name - *terraform.NodeApplyableOutput
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
output.policy_name - *terraform.NodeApplyableOutput
output.role_create_date - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
output.role_name - *terraform.NodeApplyableOutput
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
provider["registry.terraform.io/hashicorp/aws"] - *terraform.NodeApplyableProvider
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
aws_iam_role.this - *terraform.NodeApplyableResourceInstance
root - *terraform.nodeCloseModule
meta.count-boundary (EachMode fixup) - *terraform.NodeCountBoundary
provider["registry.terraform.io/hashicorp/aws"] (close) - *terraform.graphNodeCloseProvider
var.assume_role_policy - *terraform.NodeRootVariable
var.attach_policy_arns - *terraform.NodeRootVariable
var.custom_policy - *terraform.NodeRootVariable
var.custom_policy_name - *terraform.NodeRootVariable
var.force_detach_policies - *terraform.NodeRootVariable
var.max_session_duration - *terraform.NodeRootVariable
var.role_description - *terraform.NodeRootVariable
var.role_name - *terraform.NodeRootVariable
var.role_path - *terraform.NodeRootVariable
var.role_permissions_boundary_arn - *terraform.NodeRootVariable
var.tags - *terraform.NodeRootVariable
------
2021/05/12 22:08:09 [DEBUG] Starting graph walk: walkApply
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.max_session_duration"
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.attach_policy_arns"
2021/05/12 22:08:09 [TRACE] vertex "var.attach_policy_arns": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.assume_role_policy"
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.role_path"
2021/05/12 22:08:09 [TRACE] vertex "var.assume_role_policy": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"]"
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.custom_policy"
2021/05/12 22:08:09 [TRACE] vertex "var.assume_role_policy": visit complete
2021/05/12 22:08:09 [TRACE] vertex "var.custom_policy": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] vertex "var.role_path": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": starting visit (*terraform.NodeApplyableProvider)
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.custom_policy_name"
2021/05/12 22:08:09 [TRACE] vertex "var.custom_policy_name": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] vertex "var.role_path": visit complete
2021/05/12 22:08:09 [TRACE] vertex "var.max_session_duration": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "output.policy_name"
2021/05/12 22:08:09 [TRACE] vertex "output.policy_name": starting visit (*terraform.NodeApplyableOutput)
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.role_permissions_boundary_arn"
2021/05/12 22:08:09 [TRACE] vertex "var.role_permissions_boundary_arn": starting visit (*terraform.NodeRootVariable)
2021-05-12T22:08:09.448Z [INFO] plugin: configuring client automatic mTLS
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.role_name"
2021/05/12 22:08:09 [TRACE] vertex "var.role_name": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] vertex "var.role_name": visit complete
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.role_description"
2021/05/12 22:08:09 [TRACE] vertex "var.role_description": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] vertex "var.role_description": visit complete
2021/05/12 22:08:09 [TRACE] vertex "var.attach_policy_arns": visit complete
2021/05/12 22:08:09 [TRACE] vertex "var.custom_policy": visit complete
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.tags"
2021/05/12 22:08:09 [TRACE] vertex "var.tags": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] vertex "var.tags": visit complete
2021/05/12 22:08:09 [TRACE] dag/walk: visiting "var.force_detach_policies"
2021/05/12 22:08:09 [TRACE] vertex "var.force_detach_policies": starting visit (*terraform.NodeRootVariable)
2021/05/12 22:08:09 [TRACE] vertex "var.force_detach_policies": visit complete
2021/05/12 22:08:09 [TRACE] vertex "var.custom_policy_name": visit complete
2021/05/12 22:08:09 [TRACE] vertex "var.max_session_duration": visit complete
2021/05/12 22:08:09 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.policy_name in changeset
2021/05/12 22:08:09 [TRACE] EvalWriteOutput: Saving value for output.policy_name in state
2021/05/12 22:08:09 [TRACE] vertex "output.policy_name": visit complete
2021/05/12 22:08:09 [TRACE] vertex "var.role_permissions_boundary_arn": visit complete
2021-05-12T22:08:09.509Z [DEBUG] plugin: starting plugin: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 args=[.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5]
2021-05-12T22:08:09.510Z [DEBUG] plugin: plugin started: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25809
2021-05-12T22:08:09.510Z [DEBUG] plugin: waiting for RPC address: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5
2021-05-12T22:08:09.558Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: configuring server automatic mTLS: timestamp=2021-05-12T22:08:09.558Z
2021-05-12T22:08:09.595Z [DEBUG] plugin.terraform-provider-aws_v3.33.0_x5: plugin address: address=/tmp/plugin240970136 network=unix timestamp=2021-05-12T22:08:09.595Z
2021-05-12T22:08:09.595Z [DEBUG] plugin: using plugin: version=5
2021/05/12 22:08:09 [TRACE] BuiltinEvalContext: Initialized "provider[\"registry.terraform.io/hashicorp/aws\"]" provider for provider["registry.terraform.io/hashicorp/aws"]
2021/05/12 22:08:09 [TRACE] buildProviderConfig for provider["registry.terraform.io/hashicorp/aws"]: using explicit config only
2021/05/12 22:08:09 [TRACE] GRPCProvider: GetSchema
2021-05-12T22:08:09.642Z [TRACE] plugin.stdio: waiting for stdio data
2021/05/12 22:08:09 [TRACE] GRPCProvider: Configure
2021-05-12T22:08:09.730Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [INFO] AWS Auth provider used: "StaticProvider": timestamp=2021-05-12T22:08:09.730Z
2021-05-12T22:08:09.730Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [DEBUG] Trying to get account information via iam:GetUser: timestamp=2021-05-12T22:08:09.730Z
2021-05-12T22:08:09.730Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:09 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetUser Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 33
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=GetUser&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:08:09.730Z
2021-05-12T22:08:10.598Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:10 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetUser Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 678
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:15 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:08:10.598Z
2021-05-12T22:08:10.598Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:10 [DEBUG] [aws-sdk-go] <GetUserResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetUserResult>
<User>
<Path>/</Path>
<PasswordLastUsed>2021-02-24T05:21:29Z</PasswordLastUsed>
<Arn>arn:aws:iam::000000000001:user/tmp-rce-user</Arn>
<UserName>tmp-rce-user</UserName>
<UserId>AIDAZLO5RQSBZU26DOGE5</UserId>
<CreateDate>2021-02-13T02:11:43Z</CreateDate>
<Tags>
<member>
<Value>test123@test.com</Value>
<Key>owner</Key>
</member>
</Tags>
</User>
</GetUserResult>
<ResponseMetadata>
<RequestId>68a81634-5402-4e56-843b-11153745c482</RequestId>
</ResponseMetadata>
</GetUserResponse>: timestamp=2021-05-12T22:08:10.598Z
2021/05/12 22:08:10 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"]": visit complete
2021/05/12 22:08:10 [TRACE] dag/walk: visiting "aws_iam_role.this (expand)"
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": starting visit (*terraform.nodeExpandApplyableResource)
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": expanding dynamic subgraph
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": entering dynamic subgraph
2021/05/12 22:08:10 [TRACE] dag/walk: visiting "aws_iam_role.this"
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodeApplyableResource)
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this": visit complete
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": dynamic subgraph completed successfully
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this (expand)": visit complete
2021/05/12 22:08:10 [TRACE] dag/walk: visiting "aws_iam_role.this"
2021/05/12 22:08:10 [TRACE] vertex "aws_iam_role.this": starting visit (*terraform.NodeApplyableResourceInstance)
2021/05/12 22:08:10 [TRACE] EvalReadDiff: Read Update change from plan for aws_iam_role.this
2021/05/12 22:08:10 [TRACE] EvalReadState: reading state for aws_iam_role.this
2021/05/12 22:08:10 [TRACE] UpgradeResourceState: schema version of aws_iam_role.this is still 0; calling provider "aws" for any other minor fixups
2021/05/12 22:08:10 [TRACE] GRPCProvider: UpgradeResourceState
2021/05/12 22:08:10 [TRACE] EvalReadDiff: Read Update change from plan for aws_iam_role.this
2021/05/12 22:08:10 [TRACE] Re-validating config for "aws_iam_role.this"
2021/05/12 22:08:10 [TRACE] GRPCProvider: ValidateResourceTypeConfig
2021/05/12 22:08:10 [TRACE] GRPCProvider: PlanResourceChange
2021/05/12 22:08:10 [TRACE] EvalCheckPlannedChange: Verifying that actual change (action Update) matches planned change (action Update)
2021/05/12 22:08:10 [TRACE] EvalReadState: reading state for aws_iam_role.this
2021/05/12 22:08:10 [TRACE] UpgradeResourceState: schema version of aws_iam_role.this is still 0; calling provider "aws" for any other minor fixups
2021/05/12 22:08:10 [TRACE] GRPCProvider: UpgradeResourceState
aws_iam_role.this: Modifying... [id=terraform-usage-role]
2021/05/12 22:08:10 [DEBUG] EvalApply: ProviderMeta config value set
2021/05/12 22:08:10 [DEBUG] aws_iam_role.this: applying the planned Update change
2021/05/12 22:08:10 [TRACE] GRPCProvider: ApplyResourceChange
2021-05-12T22:08:10.610Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:10 [DEBUG] [aws-sdk-go] DEBUG: Request iam/UpdateAssumeRolePolicy Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 2532
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=UpdateAssumeRolePolicy&PolicyDocument=%7B%0A++%22Version%22%3A+%222012-10-17%22%2C%0A++%22Statement%22%3A+%5B%0A++++%7B%0A++++++%22Sid%22%3A+%22shedrivesmecrazy%22%2C%0A++++++%22Effect%22%3A+%22Allow%22%2C%0A++++++%22Principal%22%3A+%7B%0A++++++++%22AWS%22%3A+%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2Fonelogin_ad_association%22%0A++++++%7D%2C%0A++++++%22Action%22%3A+%22sts%3AAssumeRole%22%2C%0A++++++%22Condition%22%3A+%7B%0A++++++++%22ForAllValues%3AStringEqualsIgnoreCase%22%3A+%7B%0A++++++++++%22SAML%3Asub%22%3A+%5B%0A++++++++++++%22fakename-network_Admin%22%2C%0A++++++++++++%22fakename-network_Superadmin%22%2C%0A++++++++++++%22fakename-network_Power%22%2C%0A++++++++++++%22fakename-network_SysEng%22%2C%0A++++++++++++%22fakename-network_Standard%22%0A++++++++++%5D%0A++++++++%7D%0A++++++%7D%0A++++%7D%2C%0A++++%7B%0A++++++%22Sid%22%3A+%22likenooneelse%22%2C%0A++++++%22Effect%22%3A+%22Allow%22%2C%0A++++++%22Principal%22%3A+%7B%0A++++++++%22AWS%22%3A+%5B%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Admin%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-NetEng%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Power%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Standard%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SysEng%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SuperAdmin%22%0A++++++++%5D%0A++++++%7D%2C%0A++++++%22Action%22%3A+%22sts%3AAssumeRole%22%0A++++%7D%2C%0A++++%7B%0A++++++%22Sid%22%3A+%22andicanthelpmyself%22%2C%0A++++++%22Effect%22%3A+%22Allow%22%2C%0A++++++%22Principal%22%3A+%7B%0A++++++++%22AWS%22%3A+%5B%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000002%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000003%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000004%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A00000000005%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000006%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000007%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000001%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000008%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000009%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000010%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000011%3Aroot%22%2C%0A++++++++++%22arn%3Aaws%3Aiam%3A%3A000000000012%3Aroot%22%0A++++++++%5D%0A++++++%7D%2C%0A++++++%22Action%22%3A+%22sts%3AAssumeRole%22%0A++++%7D%0A++%5D%0A%7D%0A&RoleName=terraform-usage-role&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:08:10.610Z
2021-05-12T22:08:11.226Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/UpdateAssumeRolePolicy Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 224
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:16 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:08:11.226Z
2021-05-12T22:08:11.226Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] <UpdateAssumeRolePolicyResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ResponseMetadata>
<RequestId>1d215368-7dda-4b35-9fe7-915c7ea4cc01</RequestId>
</ResponseMetadata>
</UpdateAssumeRolePolicyResponse>: timestamp=2021-05-12T22:08:11.226Z
2021-05-12T22:08:11.227Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/GetRole Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 63
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=GetRole&RoleName=terraform-usage-role&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:08:11.227Z
2021-05-12T22:08:11.820Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] DEBUG: Response iam/GetRole Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:17 GMT
Vary: accept-encoding
-----------------------------------------------------: timestamp=2021-05-12T22:08:11.820Z
2021-05-12T22:08:11.821Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] <GetRoleResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<GetRoleResult>
<Role>
<Path>/</Path>
<AssumeRolePolicyDocument>%7B%22Version%22%3A%222012-10-17%22%2C%22Statement%22%3A%5B%7B%22Sid%22%3A%22shedrivesmecrazy%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2Fonelogin_ad_association%22%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%2C%22Condition%22%3A%7B%22ForAllValues%3AStringEqualsIgnoreCase%22%3A%7B%22SAML%3Asub%22%3A%5B%22fakename-network_Admin%22%2C%22fakename-network_Superadmin%22%2C%22fakename-network_Power%22%2C%22fakename-network_SysEng%22%2C%22fakename-network_Standard%22%5D%7D%7D%7D%2C%7B%22Sid%22%3A%22likenooneelse%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%5B%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Admin%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Standard%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SysEng%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-SuperAdmin%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-Power%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Arole%2FGL-NetEng%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%2C%7B%22Sid%22%3A%22andicanthelpmyself%22%2C%22Effect%22%3A%22Allow%22%2C%22Principal%22%3A%7B%22AWS%22%3A%5B%22arn%3Aaws%3Aiam%3A%3A000000000008%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000009%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000002%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A00000000005%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000010%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000011%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000004%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000007%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000012%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000003%3Aroot%22%2C%22arn%3Aaws%3Aiam%3A%3A000000000001%3Aroot%22%5D%7D%2C%22Action%22%3A%22sts%3AAssumeRole%22%7D%5D%7D</AssumeRolePolicyDocument>
<MaxSessionDuration>3600</MaxSessionDuration>
<RoleId>AROAZLO5RQSBQLREIIMOZ</RoleId>
<RoleLastUsed>
<LastUsedDate>2021-05-12T21:38:54Z</LastUsedDate>
<Region>us-west-2</Region>
</RoleLastUsed>
<RoleName>terraform-usage-role</RoleName>
<Description>terraform usage role</Description>
<Arn>arn:aws:iam::000000000001:role/terraform-usage-role</Arn>
<CreateDate>2021-02-16T02:46:15Z</CreateDate>
<Tags>
<member>
<Value>test123@test.com</Value>
<Key>owner</Key>
</member>
</Tags>
</Role>
</GetRoleResult>
<ResponseMetadata>
<RequestId>b327e11b-fd71-47bb-985d-b5fc30cd3c90</RequestId>
</ResponseMetadata>
</GetRoleResponse>: timestamp=2021-05-12T22:08:11.820Z
2021-05-12T22:08:11.821Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:11 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 72
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=ListRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:08:11.821Z
2021-05-12T22:08:12.355Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 323
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:17 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:08:12.354Z
2021-05-12T22:08:12.355Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] <ListRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<PolicyNames/>
</ListRolePoliciesResult>
<ResponseMetadata>
<RequestId>e2c3cabd-b582-4562-978c-725fa7388bc4</RequestId>
</ResponseMetadata>
</ListRolePoliciesResponse>: timestamp=2021-05-12T22:08:12.354Z
2021-05-12T22:08:12.356Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] DEBUG: Request iam/ListAttachedRolePolicies Details:
---[ REQUEST POST-SIGN ]-----------------------------
POST / HTTP/1.1
Host: iam.amazonaws.com
User-Agent: aws-sdk-go/1.37.24 (go1.16; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5 (+https://www.terraform.io) terraform-provider-aws/dev (+https://registry.terraform.io/providers/hashicorp/aws)
Content-Length: 80
Content-Type: application/x-www-form-urlencoded; charset=utf-8
Accept-Encoding: gzip
Action=ListAttachedRolePolicies&RoleName=terraform-usage-role&Version=2010-05-08
-----------------------------------------------------: timestamp=2021-05-12T22:08:12.356Z
2021-05-12T22:08:12.889Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] DEBUG: Response iam/ListAttachedRolePolicies Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 557
Content-Type: text/xml
Date: Wed, 12 May 2021 22:08:17 GMT
-----------------------------------------------------: timestamp=2021-05-12T22:08:12.889Z
2021-05-12T22:08:12.889Z [INFO] plugin.terraform-provider-aws_v3.33.0_x5: 2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] <ListAttachedRolePoliciesResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<ListAttachedRolePoliciesResult>
<IsTruncated>false</IsTruncated>
<AttachedPolicies>
<member>
<PolicyArn>arn:aws:iam::000000000001:policy/terraform-usage-policy</PolicyArn>
<PolicyName>terraform-usage-policy</PolicyName>
</member>
</AttachedPolicies>
</ListAttachedRolePoliciesResult>
<ResponseMetadata>
<RequestId>fd16d10c-bf24-490b-a87c-6ed7aa5fb4da</RequestId>
</ResponseMetadata>
</ListAttachedRolePoliciesResponse>: timestamp=2021-05-12T22:08:12.889Z
2021/05/12 22:08:12 [WARN] Provider "registry.terraform.io/hashicorp/aws" produced an unexpected new value for aws_iam_role.this, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .assume_role_policy: was cty.StringVal("{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"shedrivesmecrazy\",\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::000000000001:role/onelogin_ad_association\"\n },\n \"Action\": \"sts:AssumeRole\",\n \"Condition\": {\n \"ForAllValues:StringEqualsIgnoreCase\": {\n \"SAML:sub\": [\n \"fakename-network_Admin\",\n \"fakename-network_Superadmin\",\n \"fakename-network_Power\",\n \"fakename-network_SysEng\",\n \"fakename-network_Standard\"\n ]\n }\n }\n },\n {\n \"Sid\": \"likenooneelse\",\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [\n \"arn:aws:iam::000000000001:role/GL-Admin\",\n \"arn:aws:iam::000000000001:role/GL-NetEng\",\n \"arn:aws:iam::000000000001:role/GL-Power\",\n \"arn:aws:iam::000000000001:role/GL-Standard\",\n \"arn:aws:iam::000000000001:role/GL-SysEng\",\n \"arn:aws:iam::000000000001:role/GL-SuperAdmin\"\n ]\n },\n \"Action\": \"sts:AssumeRole\"\n },\n {\n \"Sid\": \"andicanthelpmyself\",\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"AWS\": [\n \"arn:aws:iam::000000000002:root\",\n \"arn:aws:iam::000000000003:root\",\n \"arn:aws:iam::000000000004:root\",\n \"arn:aws:iam::00000000005:root\",\n \"arn:aws:iam::000000000006:root\",\n \"arn:aws:iam::000000000007:root\",\n \"arn:aws:iam::000000000001:root\",\n \"arn:aws:iam::000000000008:root\",\n \"arn:aws:iam::000000000009:root\",\n \"arn:aws:iam::000000000010:root\",\n \"arn:aws:iam::000000000011:root\",\n \"arn:aws:iam::000000000012:root\"\n ]\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"), but now cty.StringVal("{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"shedrivesmecrazy\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::000000000001:role/onelogin_ad_association\"},\"Action\":\"sts:AssumeRole\",\"Condition\":{\"ForAllValues:StringEqualsIgnoreCase\":{\"SAML:sub\":[\"fakename-network_Admin\",\"fakename-network_Superadmin\",\"fakename-network_Power\",\"fakename-network_SysEng\",\"fakename-network_Standard\"]}}},{\"Sid\":\"likenooneelse\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000001:role/GL-Admin\",\"arn:aws:iam::000000000001:role/GL-Standard\",\"arn:aws:iam::000000000001:role/GL-SysEng\",\"arn:aws:iam::000000000001:role/GL-SuperAdmin\",\"arn:aws:iam::000000000001:role/GL-Power\",\"arn:aws:iam::000000000001:role/GL-NetEng\"]},\"Action\":\"sts:AssumeRole\"},{\"Sid\":\"andicanthelpmyself\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000008:root\",\"arn:aws:iam::000000000009:root\",\"arn:aws:iam::000000000002:root\",\"arn:aws:iam::000000000006:root\",\"arn:aws:iam::000000000010:root\",\"arn:aws:iam::000000000011:root\",\"arn:aws:iam::000000000004:root\",\"arn:aws:iam::000000000007:root\",\"arn:aws:iam::000000000012:root\",\"arn:aws:iam::000000000003:root\",\"arn:aws:iam::000000000001:root\"]},\"Action\":\"sts:AssumeRole\"}]}")
2021/05/12 22:08:12 [TRACE] EvalWriteState: recording 0 dependencies for aws_iam_role.this
2021/05/12 22:08:12 [TRACE] EvalWriteState: writing current state object for aws_iam_role.this
2021/05/12 22:08:12 [TRACE] EvalApplyProvisioners: aws_iam_role.this is not freshly-created, so no provisioning is required
2021/05/12 22:08:12 [TRACE] EvalWriteState: recording 0 dependencies for aws_iam_role.this
2021/05/12 22:08:12 [TRACE] EvalWriteState: writing current state object for aws_iam_role.this
2021/05/12 22:08:12 [TRACE] vertex "aws_iam_role.this": visit complete
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "provider[\"registry.terraform.io/hashicorp/aws\"] (close)"
2021/05/12 22:08:12 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": starting visit (*terraform.graphNodeCloseProvider)
2021/05/12 22:08:12 [TRACE] GRPCProvider: Close
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "output.role_name"
2021/05/12 22:08:12 [TRACE] vertex "output.role_name": starting visit (*terraform.NodeApplyableOutput)
2021/05/12 22:08:12 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_name in changeset
2021/05/12 22:08:12 [TRACE] EvalWriteOutput: Saving value for output.role_name in state
2021/05/12 22:08:12 [TRACE] vertex "output.role_name": visit complete
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "output.role_create_date"
2021/05/12 22:08:12 [TRACE] vertex "output.role_create_date": starting visit (*terraform.NodeApplyableOutput)
aws_iam_role.this: Modifications complete after 2s [id=terraform-usage-role]
2021/05/12 22:08:12 [TRACE] ExecuteWriteOutput: Saving NoOp change for output.role_create_date in changeset
2021/05/12 22:08:12 [TRACE] EvalWriteOutput: Saving value for output.role_create_date in state
2021/05/12 22:08:12 [TRACE] vertex "output.role_create_date": visit complete
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "meta.count-boundary (EachMode fixup)"
2021/05/12 22:08:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": starting visit (*terraform.NodeCountBoundary)
2021/05/12 22:08:12 [TRACE] vertex "meta.count-boundary (EachMode fixup)": visit complete
2021-05-12T22:08:12.892Z [WARN] plugin.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
2021-05-12T22:08:12.894Z [DEBUG] plugin: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/aws/3.33.0/linux_amd64/terraform-provider-aws_v3.33.0_x5 pid=25809
2021-05-12T22:08:12.894Z [DEBUG] plugin: plugin exited
2021/05/12 22:08:12 [TRACE] vertex "provider[\"registry.terraform.io/hashicorp/aws\"] (close)": visit complete
2021/05/12 22:08:12 [TRACE] dag/walk: visiting "root"
2021/05/12 22:08:12 [TRACE] vertex "root": starting visit (*terraform.nodeCloseModule)
2021/05/12 22:08:12 [TRACE] vertex "root": visit complete
2021/05/12 22:08:12 [DEBUG] Uploading remote state to S3: {
Body: buffer(0xc0013c29c0),
Bucket: "fakename-terraform",
ContentLength: 5079,
ContentType: "application/json",
Key: "terraform/fakename-network/global/iam/fakename-aws-iam-terraform-role/terraform.tfstate",
ServerSideEncryption: "AES256"
}
2021/05/12 22:08:12 [DEBUG] [aws-sdk-go] DEBUG: Request s3/PutObject Details:
---[ REQUEST POST-SIGN ]-----------------------------
PUT /terraform/fakename-network/global/iam/fakename-aws-iam-terraform-role/terraform.tfstate HTTP/1.1
Host: fakename-terraform.s3.us-west-2.amazonaws.com
User-Agent: aws-sdk-go/1.31.9 (go1.15.6; linux; amd64) APN/1.0 HashiCorp/1.0 Terraform/0.14.5
Content-Length: 5079
X-Amz-Server-Side-Encryption: AES256
Accept-Encoding: gzip
{
"version": 4,
"terraform_version": "0.14.5",
"serial": 29,
"lineage": "fakenews",
"outputs": {
"policy_name": {
"value": "terraform-usage-policy",
"type": "string"
},
"role_create_date": {
"value": "2021-02-16T02:46:15Z",
"type": "string"
},
"role_name": {
"value": "terraform-usage-role",
"type": "string"
}
},
"resources": [
{
"mode": "managed",
"type": "aws_iam_policy",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"arn": "arn:aws:iam::000000000001:policy/terraform-usage-policy",
"description": "",
"id": "arn:aws:iam::000000000001:policy/terraform-usage-policy",
"name": "terraform-usage-policy",
"name_prefix": null,
"path": "/",
"policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"first\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:ListBucket\",\n \"s3:GetBucketVersioning\"\n \n \n ],\n \"Resource\": [\n \"arn:aws:s3:::fakename-terraform\"\n ]\n },\n {\n \"Sid\": \"second\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:DeleteObject\",\n \"s3:GetObject\",\n \"s3:PutObject\"\n ],\n \"Resource\": [\n \"arn:aws:s3:::fakename-terraform/*\"\n ]\n }\n ]\n}"
},
"sensitive_attributes": [],
"private": "fake=="
}
]
},
{
"mode": "managed",
"type": "aws_iam_role",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"schema_version": 0,
"attributes": {
"arn": "arn:aws:iam::000000000001:role/terraform-usage-role",
"assume_role_policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"shedrivesmecrazy\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::000000000001:role/onelogin_ad_association\"},\"Action\":\"sts:AssumeRole\",\"Condition\":{\"ForAllValues:StringEqualsIgnoreCase\":{\"SAML:sub\":[\"fakename-network_Admin\",\"fakename-network_Superadmin\",\"fakename-network_Power\",\"fakename-network_SysEng\",\"fakename-network_Standard\"]}}},{\"Sid\":\"likenooneelse\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000001:role/GL-Admin\",\"arn:aws:iam::000000000001:role/GL-Standard\",\"arn:aws:iam::000000000001:role/GL-SysEng\",\"arn:aws:iam::000000000001:role/GL-SuperAdmin\",\"arn:aws:iam::000000000001:role/GL-Power\",\"arn:aws:iam::000000000001:role/GL-NetEng\"]},\"Action\":\"sts:AssumeRole\"},{\"Sid\":\"andicanthelpmyself\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::000000000008:root\",\"arn:aws:iam::000000000009:root\",\"arn:aws:iam::000000000002:root\",\"arn:aws:iam::00000000005:root\",\"arn:aws:iam::000000000010:root\",\"arn:aws:iam::000000000011:root\",\"arn:aws:iam::000000000004:root\",\"arn:aws:iam::000000000007:root\",\"arn:aws:iam::000000000012:root\",\"arn:aws:iam::000000000003:root\",\"arn:aws:iam::000000000001:root\"]},\"Action\":\"sts:AssumeRole\"}]}",
"create_date": "2021-02-16T02:46:15Z",
"description": "terraform usage role",
"force_detach_policies": false,
"id": "terraform-usage-role",
"inline_policy": [
{
"name": "",
"policy": ""
}
],
"managed_policy_arns": [
"arn:aws:iam::000000000001:policy/terraform-usage-policy"
],
"max_session_duration": 3600,
"name": "terraform-usage-role",
"name_prefix": null,
"path": "/",
"permissions_boundary": "",
"tags": {
"owner": "test123@test.com"
},
"unique_id": "FAKENEWS"
},
"sensitive_attributes": [],
"private": "fake=="
}
]
},
{
"mode": "managed",
"type": "aws_iam_role_policy_attachment",
"name": "this",
"provider": "provider[\"registry.terraform.io/hashicorp/aws\"]",
"instances": [
{
"index_key": 0,
"schema_version": 0,
"attributes": {
"id": "terraform-usage-role-20210216024614902500000001",
"policy_arn": "arn:aws:iam::000000000001:policy/terraform-usage-policy",
"role": "terraform-usage-role"
},
"sensitive_attributes": [],
"private": "fake==",
"dependencies": [
"aws_iam_policy.this",
"aws_iam_role.this"
]
}
]
}
]
}
-----------------------------------------------------
2021/05/12 22:08:13 [DEBUG] [aws-sdk-go] DEBUG: Response s3/PutObject Details:
---[ RESPONSE ]--------------------------------------
HTTP/1.1 200 OK
Connection: close
Content-Length: 0
Date: Wed, 12 May 2021 22:08:20 GMT
-----------------------------------------------------
2021/05/12 22:08:13 [DEBUG] [aws-sdk-go]

Apply complete! Resources: 0 added, 1 changed, 0 destroyed.

Outputs:
policy_name = "terraform-usage-policy"
role_create_date = "2021-02-16T02:46:15Z"
role_name = "terraform-usage-role"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment