Created
November 11, 2023 21:41
-
-
Save simonweil/e023ac03b6966a05f712c93573e86e5b to your computer and use it in GitHub Desktop.
tf output gist
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ TF_LOG=trace terraform init | |
2023-11-11T23:19:41.384+0200 [INFO] Terraform version: 1.6.3 | |
2023-11-11T23:19:41.384+0200 [DEBUG] using github.com/hashicorp/go-tfe v1.36.0 | |
2023-11-11T23:19:41.384+0200 [DEBUG] using github.com/hashicorp/hcl/v2 v2.19.1 | |
2023-11-11T23:19:41.384+0200 [DEBUG] using github.com/hashicorp/terraform-svchost v0.1.1 | |
2023-11-11T23:19:41.384+0200 [DEBUG] using github.com/zclconf/go-cty v1.14.1 | |
2023-11-11T23:19:41.384+0200 [INFO] Go runtime version: go1.21.3 | |
2023-11-11T23:19:41.384+0200 [INFO] CLI args: []string{"/opt/homebrew/Cellar/tfenv/3.0.0/versions/1.6.3/terraform", "init"} | |
2023-11-11T23:19:41.384+0200 [TRACE] Stdout is a terminal of width 214 | |
2023-11-11T23:19:41.384+0200 [TRACE] Stderr is a terminal of width 214 | |
2023-11-11T23:19:41.384+0200 [TRACE] Stdin is a terminal | |
2023-11-11T23:19:41.384+0200 [DEBUG] Attempting to open CLI config file: /Users/USER/.terraformrc | |
2023-11-11T23:19:41.384+0200 [INFO] Loading CLI configuration from /Users/USER/.terraformrc | |
2023-11-11T23:19:41.399+0200 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2023-11-11T23:19:41.399+0200 [DEBUG] ignoring non-existing provider search directory /Users/USER/.terraform.d/plugins | |
2023-11-11T23:19:41.399+0200 [DEBUG] ignoring non-existing provider search directory /Users/USER/Library/Application Support/io.terraform/plugins | |
2023-11-11T23:19:41.399+0200 [DEBUG] ignoring non-existing provider search directory /Library/Application Support/io.terraform/plugins | |
2023-11-11T23:19:41.399+0200 [INFO] CLI command args: []string{"init"} | |
Initializing the backend... | |
2023-11-11T23:19:41.404+0200 [TRACE] Meta.Backend: built configuration for "s3" backend with hash value XXXX | |
2023-11-11T23:19:41.404+0200 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory | |
2023-11-11T23:19:41.404+0200 [DEBUG] New state was assigned lineage "YYYYY" | |
2023-11-11T23:19:41.404+0200 [TRACE] Meta.Backend: moving from default local state only to "s3" backend | |
2023-11-11T23:19:41.404+0200 [DEBUG] checking for provisioner in "." | |
2023-11-11T23:19:41.404+0200 [DEBUG] checking for provisioner in "/opt/homebrew/Cellar/tfenv/3.0.0/versions/1.6.3" | |
2023-11-11T23:19:41.404+0200 [TRACE] backend/local: state manager for workspace "default" will: | |
- read initial snapshot from terraform.tfstate | |
- write new snapshots to terraform.tfstate | |
- create any backup at terraform.tfstate.backup | |
2023-11-11T23:19:41.404+0200 [TRACE] statemgr.Filesystem: reading initial snapshot from terraform.tfstate | |
2023-11-11T23:19:41.404+0200 [TRACE] statemgr.Filesystem: snapshot file has nil snapshot, but that's okay | |
2023-11-11T23:19:41.404+0200 [TRACE] statemgr.Filesystem: read nil snapshot | |
2023-11-11T23:19:41.404+0200 [TRACE] Meta.Backend: ignoring local "default" workspace because its state is empty | |
2023-11-11T23:19:41.407+0200 [TRACE] backend-s3.aws-base: Resolving AWS configuration: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:41.407+0200 [DEBUG] backend-s3.aws-base: Resolving credentials provider: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:41.407+0200 [TRACE] backend-s3.aws-base: Building default HTTP client: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:41.408+0200 [DEBUG] backend-s3.aws-base: Using profile: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate tf_aws.profile=<AWSPROFILE>-<AWSACCTID> tf_aws.profile.source=envvar | |
2023-11-11T23:19:41.408+0200 [DEBUG] backend-s3.aws-base: Loading profile: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate tf_aws.profile=<AWSPROFILE>-<AWSACCTID> | |
2023-11-11T23:19:41.412+0200 [DEBUG] backend-s3.aws-base: Loading configuration: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:41.413+0200 [DEBUG] backend-s3.aws-base: Retrieving credentials: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:41.421+0200 [DEBUG] backend-s3.aws-base: HTTP Request Sent: aws.operation=GetRoleCredentials aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=SSO tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate net.peer.name=portal.sso.<awsregion>.amazonaws.com http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.6.3 (+https://www.terraform.io) aws-sdk-go-v2/1.21.0 os/macos lang/go#1.21.3 md/GOOS#darwin md/GOARCH#arm64 api/sso#1.13.6" http.request.header.x_amz_sso_bearer_token="<bearer-token>" http.request.header.amz_sdk_invocation_id=<id> http.request.header.amz_sdk_request="attempt=1; max=3" http.request.body="" http.method=GET http.url="https://portal.sso.<awsregion>.amazonaws.com/federation/credentials?account_id=<AWSACCTID>&role_name=<AWSPROFILE>" | |
2023-11-11T23:19:42.417+0200 [DEBUG] backend-s3.aws-base: HTTP Response Received: aws.operation=GetRoleCredentials aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=SSO tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate http.response.header.server="AWS SSO" http.response.header.x_amzn_requestid=<reqid> http.response.header.date="Sat, 11 Nov 2023 21:19:42 GMT" http.response.header.content_type=application/json http.status_code=200 http.response_content_length=1088 http.response.header.access_control_expose_headers=["RequestId", "x-amzn-RequestId"] http.response.header.requestid=<reqid> http.response.header.cache_control=no-cache | |
http.response.body= | |
| {"roleCredentials":{"accessKeyId":"************","secretAccessKey":"********************************","sessionToken":"*****","expiration":169679766381000}} | |
http.duration=996 | |
2023-11-11T23:19:42.418+0200 [INFO] backend-s3.aws-base: Retrieved initial credentials: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate tf_aws.credentials_source=SSOProvider | |
2023-11-11T23:19:42.418+0200 [INFO] backend-s3.aws-base: Assuming IAM Role: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate tf_aws.assume_role.role_arn=<rolename-to-assume> tf_aws.assume_role.session_name=<envname> tf_aws.assume_role.external_id=<external_id> tf_aws.assume_role.source_identity="" | |
2023-11-11T23:19:42.419+0200 [DEBUG] backend-s3.aws-base: HTTP Request Sent: aws.operation=AssumeRole aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=STS tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate http.method=POST http.url=https://sts.<awsregion>.amazonaws.com/ http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.6.3 (+https://www.terraform.io) aws-sdk-go-v2/1.21.0 os/macos lang/go#1.21.3 md/GOOS#darwin md/GOARCH#arm64 api/sts#1.21.5" http.request.header.x_amz_security_token="*****" http.request.header.content_type=application/x-www-form-urlencoded | |
http.request.body= | |
| Action=AssumeRole&DurationSeconds=900&ExternalId=<external_id>&RoleArn=<rolename-to-assume>&RoleSessionName=<envname>&Version=2011-06-15 | |
net.peer.name=sts.<awsregion>.amazonaws.com http.request_content_length=258 http.request.header.authorization="AWS4-HMAC-SHA256 Credential=**********/20231111/<awsregion>/sts/aws4_request, SignedHeaders=amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=*****" http.request.header.amz_sdk_request="attempt=1; max=3" http.request.header.x_amz_date=20231111T211942Z http.request.header.amz_sdk_invocation_id=<id> | |
2023-11-11T23:19:43.302+0200 [DEBUG] backend-s3.aws-base: HTTP Response Received: aws.operation=AssumeRole aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=STS tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
http.response.body= | |
| <AssumeRoleResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
| <AssumeRoleResult> | |
| <AssumedRoleUser> | |
| <AssumedRoleId>*************:<envname></AssumedRoleId> | |
| <Arn><rolename-to-assume>/<envname></Arn> | |
| </AssumedRoleUser> | |
| <Credentials> | |
| <AccessKeyId>************</AccessKeyId> | |
| <SecretAccessKey>********************************</SecretAccessKey> | |
| <SessionToken>*****</SessionToken> | |
| <Expiration>2023-11-11T21:34:43Z</Expiration> | |
| </Credentials> | |
| </AssumeRoleResult> | |
| <ResponseMetadata> | |
| <RequestId>reqid</RequestId> | |
| </ResponseMetadata> | |
| </AssumeRoleResponse> | |
http.duration=882 http.status_code=200 http.response_content_length=1456 http.response.header.x_amzn_requestid=<reqid> http.response.header.content_type=text/xml http.response.header.date="Sat, 11 Nov 2023 21:19:43 GMT" | |
2023-11-11T23:19:43.303+0200 [DEBUG] backend-s3.aws-base: HTTP Request Sent: aws.operation=AssumeRole aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=STS tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate http.method=POST http.request_content_length=258 http.request.header.authorization="AWS4-HMAC-SHA256 Credential=************/20231111/<awsregion>/sts/aws4_request, SignedHeaders=amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=*****" http.request.header.x_amz_security_token="*****" http.request.header.content_type=application/x-www-form-urlencoded http.request.header.amz_sdk_invocation_id=<id> http.request.header.amz_sdk_request="attempt=1; max=3" | |
http.request.body= | |
| Action=AssumeRole&DurationSeconds=900&ExternalId=<external_id>&RoleArn=<rolename-to-assume>&RoleSessionName=<envname>&Version=2011-06-15 | |
http.url=https://sts.<awsregion>.amazonaws.com/ net.peer.name=sts.<awsregion>.amazonaws.com http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.6.3 (+https://www.terraform.io) aws-sdk-go-v2/1.21.0 os/macos lang/go#1.21.3 md/GOOS#darwin md/GOARCH#arm64 api/sts#1.21.5" http.request.header.x_amz_date=20231111T211943Z | |
2023-11-11T23:19:43.657+0200 [DEBUG] backend-s3.aws-base: HTTP Response Received: aws.operation=AssumeRole aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=STS tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate http.response.header.x_amzn_requestid=<reqid> http.response.header.content_type=text/xml http.response.header.date="Sat, 11 Nov 2023 21:19:43 GMT" | |
http.response.body= | |
| <AssumeRoleResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
| <AssumeRoleResult> | |
| <AssumedRoleUser> | |
| <AssumedRoleId>*************:<envname></AssumedRoleId> | |
| <Arn><rolename-to-assume>/<envname></Arn> | |
| </AssumedRoleUser> | |
| <Credentials> | |
| <AccessKeyId>************</AccessKeyId> | |
| <SecretAccessKey>********************************</SecretAccessKey> | |
| <SessionToken>****</SessionToken> | |
| <Expiration>2023-11-11T21:34:43Z</Expiration> | |
| </Credentials> | |
| </AssumeRoleResult> | |
| <ResponseMetadata> | |
| <RequestId>reqid</RequestId> | |
| </ResponseMetadata> | |
| </AssumeRoleResponse> | |
http.duration=353 http.status_code=200 http.response_content_length=1456 | |
2023-11-11T23:19:43.657+0200 [INFO] backend-s3.aws-base: Retrieved credentials: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate tf_aws.credentials_source=AssumeRoleProvider | |
2023-11-11T23:19:43.657+0200 [TRACE] backend-s3.aws-base: Building default HTTP client: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:43.657+0200 [DEBUG] backend-s3.aws-base: Loading configuration: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:43.659+0200 [DEBUG] backend-s3.aws-base: Retrieving caller identity from STS: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:43.660+0200 [DEBUG] backend-s3.aws-base: HTTP Request Sent: aws.operation=GetCallerIdentity aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=STS tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate net.peer.name=sts.<awsregion>.amazonaws.com http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.6.3 (+https://www.terraform.io) aws-sdk-go-v2/1.21.0 os/macos lang/go#1.21.3 md/GOOS#darwin md/GOARCH#arm64 api/sts#1.21.5" http.request.header.amz_sdk_invocation_id=<id> http.request.header.x_amz_date=20231111T211943Z | |
http.request.body= | |
| Action=GetCallerIdentity&Version=2011-06-15 | |
http.method=POST http.request_content_length=43 http.request.header.authorization="AWS4-HMAC-SHA256 Credential=************/20231111/<awsregion>/sts/aws4_request, SignedHeaders=amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=*****" http.request.header.x_amz_security_token="*****" http.request.header.content_type=application/x-www-form-urlencoded http.request.header.amz_sdk_request="attempt=1; max=5" http.url=https://sts.<awsregion>.amazonaws.com/ | |
2023-11-11T23:19:44.479+0200 [DEBUG] backend-s3.aws-base: HTTP Response Received: aws.operation=GetCallerIdentity aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=STS tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate http.response.header.date="Sat, 11 Nov 2023 21:19:44 GMT" | |
http.response.body= | |
| <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
| <GetCallerIdentityResult> | |
| <Arn><rolename-to-assume>/<envname></Arn> | |
| <UserId>*************:<envname></UserId> | |
| <Account><acctid></Account> | |
| </GetCallerIdentityResult> | |
| <ResponseMetadata> | |
| <RequestId>reqid</RequestId> | |
| </ResponseMetadata> | |
| </GetCallerIdentityResponse> | |
http.duration=819 http.status_code=200 http.response_content_length=464 http.response.header.x_amzn_requestid=<reqid> http.response.header.content_type=text/xml | |
2023-11-11T23:19:44.479+0200 [INFO] backend-s3.aws-base: Retrieved caller identity from STS: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:44.479+0200 [DEBUG] backend-s3.aws-base: Retrieving caller identity from STS: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:44.479+0200 [DEBUG] backend-s3.aws-base: HTTP Request Sent: aws.operation=GetCallerIdentity aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=STS tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate http.request.header.authorization="AWS4-HMAC-SHA256 Credential=************5FDM/20231111/<awsregion>/sts/aws4_request, SignedHeaders=amz-sdk-invocation-id;amz-sdk-request;content-length;content-type;host;x-amz-date;x-amz-security-token, Signature=*****" http.request.header.content_type=application/x-www-form-urlencoded http.request.header.amz_sdk_request="attempt=1; max=5" http.request.header.x_amz_date=20231111T211944Z | |
http.request.body= | |
| Action=GetCallerIdentity&Version=2011-06-15 | |
http.url=https://sts.<awsregion>.amazonaws.com/ net.peer.name=sts.<awsregion>.amazonaws.com http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.6.3 (+https://www.terraform.io) aws-sdk-go-v2/1.21.0 os/macos lang/go#1.21.3 md/GOOS#darwin md/GOARCH#arm64 api/sts#1.21.5" http.request_content_length=43 http.request.header.x_amz_security_token="*****" http.request.header.amz_sdk_invocation_id=<id> http.method=POST | |
2023-11-11T23:19:44.823+0200 [DEBUG] backend-s3.aws-base: HTTP Response Received: aws.operation=GetCallerIdentity aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=STS tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate http.response.header.x_amzn_requestid=<reqid> http.response.header.content_type=text/xml | |
http.response.body= | |
| <GetCallerIdentityResponse xmlns="https://sts.amazonaws.com/doc/2011-06-15/"> | |
| <GetCallerIdentityResult> | |
| <Arn><rolename-to-assume>/<envname></Arn> | |
| <UserId>*************:<envname></UserId> | |
| <Account><acctid></Account> | |
| </GetCallerIdentityResult> | |
| <ResponseMetadata> | |
| <RequestId>reqid</RequestId> | |
| </ResponseMetadata> | |
| </GetCallerIdentityResponse> | |
http.duration=341 http.status_code=200 http.response_content_length=464 http.response.header.date="Sat, 11 Nov 2023 21:19:44 GMT" | |
2023-11-11T23:19:44.824+0200 [INFO] backend-s3.aws-base: Retrieved caller identity from STS: tf_backend.operation=Configure tf_backend.req_id=<reqid> tf_backend.s3.bucket=state-bucket-name tf_backend.s3.path=<AWS-ACCOUNT-ID>/<accountname>/<env>/terraform.tfstate | |
2023-11-11T23:19:44.826+0200 [DEBUG] New state was assigned lineage "XXXXXX" | |
2023-11-11T23:19:44.828+0200 [DEBUG] backend-s3: HTTP Request Sent: aws.operation=ListObjectsV2 aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=S3 tf_backend.operation=Workspaces tf_backend.req_id=4f1f7000-adcc-cc57-806e-5ec4fae58c68 tf_backend.s3.bucket=state-bucket-name tf_backend.workspace-prefix=env:/ http.url="https://state-bucket-name.s3.<awsregion>.amazonaws.com/?list-type=2&max-keys=1000&prefix=env%3A%2F" http.user_agent="APN/1.0 HashiCorp/1.0 Terraform/1.6.3 (+https://www.terraform.io) aws-sdk-go-v2/1.21.0 os/macos lang/go#1.21.3 md/GOOS#darwin md/GOARCH#arm64 api/s3#1.38.5" http.request.header.amz_sdk_invocation_id=<id> http.request.header.x_amz_content_sha256=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 http.method=GET net.peer.name=state-bucket-name.s3.<awsregion>.amazonaws.com http.request.header.authorization="AWS4-HMAC-SHA256 Credential=************/20231111/<awsregion>/s3/aws4_request, SignedHeaders=accept-encoding;amz-sdk-invocation-id;amz-sdk-request;host;x-amz-content-sha256;x-amz-date;x-amz-security-token, Signature=*****" http.request.header.x_amz_security_token="*****" http.request.header.accept_encoding=identity http.request.header.amz_sdk_request="attempt=1; max=5" http.request.header.x_amz_date=20231111T211944Z http.request.body="" | |
2023-11-11T23:19:45.796+0200 [DEBUG] backend-s3: HTTP Response Received: aws.operation=ListObjectsV2 aws.region=<awsregion> aws.sdk=aws-sdk-go-v2 aws.service=S3 tf_backend.operation=Workspaces tf_backend.req_id=4f1f7000-adcc-cc57-806e-5ec4fae58c68 tf_backend.s3.bucket=state-bucket-name tf_backend.workspace-prefix=env:/ http.status_code=403 http.response.header.x_amz_request_id=CV1ZENT3X683FHTB http.response.header.content_type=application/xml http.response.header.date="Sat, 11 Nov 2023 21:19:44 GMT" http.response.header.server=AmazonS3 | |
http.response.body= | |
| <?xml version="1.0" encoding="UTF-8"?> | |
| <Error><Code>AccessDenied</Code><Message>Access Denied</Message><RequestId>reqid<HostId></HostId></Error> | |
http.duration=967 http.response.header.x_amz_bucket_region=<awsregion> http.response.header.x_amz_id_2="fojVlgQtB5esKaxG1CkcpBGsHCpijPMrgvq2yU62gLmkJ7AGCMgWu3nT8+JtFJl8TCEdU1p9HKI=" | |
2023-11-11T23:19:45.796+0200 [DEBUG] backend-s3: request failed with unretryable error https response error StatusCode: 403, RequestID: reqi, HostID: XXXX, api error AccessDenied: Access Denied: tf_backend.operation=Workspaces tf_backend.req_id=4f1f7000-adcc-cc57-806e-5ec4fae58c68 tf_backend.s3.bucket=state-bucket-name tf_backend.workspace-prefix=env:/ | |
╷ | |
│ Error: Failed to get existing workspaces: Unable to list objects in S3 bucket "state-bucket-name": operation error S3: ListObjectsV2, https response error StatusCode: 403, RequestID: reqid, HostID: XXXX, api error AccessDenied: Access Denied | |
│ | |
│ | |
╵ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment