terraform_version = "1.1.2" planned_values = { "outputs": {}, "resources": { "aws_iam_policy.policy": { "address": "aws_iam_policy.policy", "depends_on": [], "deposed_key": "", "index": null, "mode": "managed", "module_address": "", "name": "policy", "provider_name": "registry.terraform.io/hashicorp/aws", "tainted": false, "type": "aws_iam_policy", "values": { "description": "A test policy", "name": "test-policy", "name_prefix": null, "path": "/", "policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": [\n \"ssm:GetParameter*\",\n \"secretsmanager:GetSecretValue\",\n \"s3:GetObject\",\n \"*\",\n \"rds:CopyDBSnapshot\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\"arn::us-east-1:*\", \"*\"]\n }\n ]\n}\n", "tags": null, }, }, "aws_iam_policy.test": { "address": "aws_iam_policy.test", "depends_on": [], "deposed_key": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "tainted": false, "type": "aws_iam_policy", "values": { "description": "My sentinel test policy", "name": "test_policy", "name_prefix": null, "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"ssm:GetParameter*\",\"*\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:kms:us-east-1:563533413750:key/09ee66e1-218f-4f81-892d-a9be0ce5fdb2cd\",\"*\"]}],\"Version\":\"2012-10-17\"}", "tags": null, }, }, "aws_iam_role.test": { "address": "aws_iam_role.test", "depends_on": [], "deposed_key": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "tainted": false, "type": "aws_iam_role", "values": { "assume_role_policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n", "description": null, "force_detach_policies": false, "max_session_duration": 3600, "name": "test-role", "path": "/", "permissions_boundary": null, "tags": null, }, }, "aws_iam_role_policy_attachment.test-attach": { "address": "aws_iam_role_policy_attachment.test-attach", "depends_on": [], "deposed_key": "", "index": null, "mode": "managed", "module_address": "", "name": "test-attach", "provider_name": "registry.terraform.io/hashicorp/aws", "tainted": false, "type": "aws_iam_role_policy_attachment", "values": { "role": "test-role", }, }, "aws_security_group.test": { "address": "aws_security_group.test", "depends_on": [], "deposed_key": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "tainted": false, "type": "aws_security_group", "values": { "description": "Allow TLS inbound traffic", "egress": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "", "from_port": 0, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": [], "protocol": "-1", "security_groups": [], "self": false, "to_port": 0, }, ], "ingress": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "TLS from VPC", "from_port": 443, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [], "self": false, "to_port": 443, }, ], "name": "allow_tls", "revoke_rules_on_delete": false, "tags": null, "timeouts": null, }, }, "aws_security_group_rule.test": { "address": "aws_security_group_rule.test", "depends_on": [], "deposed_key": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "tainted": false, "type": "aws_security_group_rule", "values": { "cidr_blocks": [ "0.0.0.0/0", ], "description": null, "from_port": 0, "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "self": false, "to_port": 65535, "type": "egress", }, }, "aws_subnet.test": { "address": "aws_subnet.test", "depends_on": [], "deposed_key": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "tainted": false, "type": "aws_subnet", "values": { "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1a", "cidr_block": "10.0.1.0/24", "customer_owned_ipv4_pool": null, "enable_dns64": false, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "ipv6_cidr_block": null, "ipv6_native": false, "map_customer_owned_ip_on_launch": null, "map_public_ip_on_launch": false, "outpost_arn": null, "tags": null, "timeouts": null, }, }, "aws_vpc.test": { "address": "aws_vpc.test", "depends_on": [], "deposed_key": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "tainted": false, "type": "aws_vpc", "values": { "assign_generated_ipv6_cidr_block": null, "cidr_block": "10.0.0.0/16", "enable_dns_support": true, "instance_tenancy": "default", "ipv4_ipam_pool_id": null, "ipv4_netmask_length": null, "ipv6_ipam_pool_id": null, "ipv6_netmask_length": null, "tags": null, }, }, }, } variables = { "acc_id_vault": { "name": "acc_id_vault", "value": "086957365384", }, "acc_short_alias": { "name": "acc_short_alias", "value": "pgraws26", }, "mongo_private_key": { "name": "mongo_private_key", "value": "", }, "mongo_public_key": { "name": "mongo_public_key", "value": "", }, } resource_changes = { "aws_iam_policy.policy": { "address": "aws_iam_policy.policy", "change": { "actions": [ "create", ], "after": { "description": "A test policy", "name": "test-policy", "name_prefix": null, "path": "/", "policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": [\n \"ssm:GetParameter*\",\n \"secretsmanager:GetSecretValue\",\n \"s3:GetObject\",\n \"*\",\n \"rds:CopyDBSnapshot\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\"arn::us-east-1:*\", \"*\"]\n }\n ]\n}\n", "tags": null, }, "after_unknown": { "arn": true, "id": true, "policy_id": true, "tags_all": true, }, "before": null, }, "deposed": "", "index": null, "mode": "managed", "module_address": "", "name": "policy", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_iam_policy", }, "aws_iam_policy.test": { "address": "aws_iam_policy.test", "change": { "actions": [ "create", ], "after": { "description": "My sentinel test policy", "name": "test_policy", "name_prefix": null, "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"ssm:GetParameter*\",\"*\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:kms:us-east-1:563533413750:key/09ee66e1-218f-4f81-892d-a9be0ce5fdb2cd\",\"*\"]}],\"Version\":\"2012-10-17\"}", "tags": null, }, "after_unknown": { "arn": true, "id": true, "policy_id": true, "tags_all": true, }, "before": null, }, "deposed": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_iam_policy", }, "aws_iam_role.test": { "address": "aws_iam_role.test", "change": { "actions": [ "create", ], "after": { "assume_role_policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n", "description": null, "force_detach_policies": false, "max_session_duration": 3600, "name": "test-role", "path": "/", "permissions_boundary": null, "tags": null, }, "after_unknown": { "arn": true, "create_date": true, "id": true, "inline_policy": true, "managed_policy_arns": true, "name_prefix": true, "tags_all": true, "unique_id": true, }, "before": null, }, "deposed": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_iam_role", }, "aws_iam_role_policy_attachment.test-attach": { "address": "aws_iam_role_policy_attachment.test-attach", "change": { "actions": [ "create", ], "after": { "role": "test-role", }, "after_unknown": { "id": true, "policy_arn": true, }, "before": null, }, "deposed": "", "index": null, "mode": "managed", "module_address": "", "name": "test-attach", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_iam_role_policy_attachment", }, "aws_security_group.test": { "address": "aws_security_group.test", "change": { "actions": [ "create", ], "after": { "description": "Allow TLS inbound traffic", "egress": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "", "from_port": 0, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": [], "protocol": "-1", "security_groups": [], "self": false, "to_port": 0, }, ], "ingress": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "TLS from VPC", "from_port": 443, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [], "self": false, "to_port": 443, }, ], "name": "allow_tls", "revoke_rules_on_delete": false, "tags": null, "timeouts": null, }, "after_unknown": { "arn": true, "egress": [ { "cidr_blocks": [ false, ], "ipv6_cidr_blocks": [ false, ], "prefix_list_ids": [], "security_groups": [], }, ], "id": true, "ingress": [ { "cidr_blocks": [ false, ], "ipv6_cidr_blocks": [ false, ], "prefix_list_ids": [], "security_groups": [], }, ], "name_prefix": true, "owner_id": true, "tags_all": true, "vpc_id": true, }, "before": null, }, "deposed": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_security_group", }, "aws_security_group_rule.test": { "address": "aws_security_group_rule.test", "change": { "actions": [ "create", ], "after": { "cidr_blocks": [ "0.0.0.0/0", ], "description": null, "from_port": 0, "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "self": false, "to_port": 65535, "type": "egress", }, "after_unknown": { "cidr_blocks": [ false, ], "id": true, "security_group_id": true, "source_security_group_id": true, }, "before": null, }, "deposed": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_security_group_rule", }, "aws_subnet.test": { "address": "aws_subnet.test", "change": { "actions": [ "create", ], "after": { "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1a", "cidr_block": "10.0.1.0/24", "customer_owned_ipv4_pool": null, "enable_dns64": false, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "ipv6_cidr_block": null, "ipv6_native": false, "map_customer_owned_ip_on_launch": null, "map_public_ip_on_launch": false, "outpost_arn": null, "tags": null, "timeouts": null, }, "after_unknown": { "arn": true, "availability_zone_id": true, "id": true, "ipv6_cidr_block_association_id": true, "owner_id": true, "private_dns_hostname_type_on_launch": true, "tags_all": true, "vpc_id": true, }, "before": null, }, "deposed": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_subnet", }, "aws_vpc.test": { "address": "aws_vpc.test", "change": { "actions": [ "create", ], "after": { "assign_generated_ipv6_cidr_block": null, "cidr_block": "10.0.0.0/16", "enable_dns_support": true, "instance_tenancy": "default", "ipv4_ipam_pool_id": null, "ipv4_netmask_length": null, "ipv6_ipam_pool_id": null, "ipv6_netmask_length": null, "tags": null, }, "after_unknown": { "arn": true, "default_network_acl_id": true, "default_route_table_id": true, "default_security_group_id": true, "dhcp_options_id": true, "enable_classiclink": true, "enable_classiclink_dns_support": true, "enable_dns_hostnames": true, "id": true, "ipv6_association_id": true, "ipv6_cidr_block": true, "ipv6_cidr_block_network_border_group": true, "main_route_table_id": true, "owner_id": true, "tags_all": true, }, "before": null, }, "deposed": "", "index": null, "mode": "managed", "module_address": "", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_vpc", }, } output_changes = {} raw = { "configuration": { "provider_config": { "aws": { "expressions": { "access_key": { "references": [ "module.vaultprovider.access_key", "module.vaultprovider", ], }, "region": { "constant_value": "us-east-1", }, "secret_key": { "references": [ "module.vaultprovider.secret_key", "module.vaultprovider", ], }, "token": { "references": [ "module.vaultprovider.security_token", "module.vaultprovider", ], }, }, "name": "aws", "version_constraint": "~> 3.0", }, "module.vaultprovider:vault": { "expressions": { "address": { "references": [ "var.environment", ], }, }, "module_address": "module.vaultprovider", "name": "vault", }, "mongodbatlas": { "name": "mongodbatlas", "version_constraint": ">= 1.2.0", }, }, "root_module": { "module_calls": { "vaultprovider": { "expressions": { "acc_id_vault": { "references": [ "var.acc_id_vault", ], }, "acc_short_alias": { "references": [ "var.acc_short_alias", ], }, }, "module": { "outputs": { "access_key": { "expression": { "references": [ "data.vault_aws_access_credentials.aws_creds.access_key", "data.vault_aws_access_credentials.aws_creds", ], }, }, "secret_key": { "expression": { "references": [ "data.vault_aws_access_credentials.aws_creds.secret_key", "data.vault_aws_access_credentials.aws_creds", ], }, }, "security_token": { "expression": { "references": [ "data.vault_aws_access_credentials.aws_creds.security_token", "data.vault_aws_access_credentials.aws_creds", ], }, }, }, "resources": [ { "address": "data.vault_aws_access_credentials.aws_creds", "expressions": { "backend": { "constant_value": "aws", }, "role": { "references": [ "var.acc_short_alias", "var.acc_id_vault", ], }, "type": { "constant_value": "sts", }, }, "mode": "data", "name": "aws_creds", "provider_config_key": "vaultprovider:vault", "schema_version": 0, "type": "vault_aws_access_credentials", }, ], "variables": { "acc_id_vault": { "description": "Required: The AWS Account ID for Vault to Leverage.", }, "acc_short_alias": { "description": "Required: The short AWS account Alias. (eg. aws44d) ", }, "environment": { "default": "prod", "description": "Optional: Which Vault environment to leverage. Should almost always be 'prod' unless testing against dev environment. Defaults to prod.", }, }, }, "source": "clo-tfe-prod.prci.com/security/vaultprovider/aws", "version_constraint": "~> 2.0", }, }, "resources": [ { "address": "aws_iam_policy.policy", "expressions": { "description": { "constant_value": "A test policy", }, "name": { "constant_value": "test-policy", }, "policy": { "constant_value": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": [\n \"ssm:GetParameter*\",\n \"secretsmanager:GetSecretValue\",\n \"s3:GetObject\",\n \"*\",\n \"rds:CopyDBSnapshot\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\"arn::us-east-1:*\", \"*\"]\n }\n ]\n}\n", }, }, "mode": "managed", "name": "policy", "provider_config_key": "aws", "schema_version": 0, "type": "aws_iam_policy", }, { "address": "aws_iam_policy.test", "expressions": { "description": { "constant_value": "My sentinel test policy", }, "name": { "constant_value": "test_policy", }, "path": { "constant_value": "/", }, "policy": {}, }, "mode": "managed", "name": "test", "provider_config_key": "aws", "schema_version": 0, "type": "aws_iam_policy", }, { "address": "aws_iam_role.test", "expressions": { "assume_role_policy": { "constant_value": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n", }, "name": { "constant_value": "test-role", }, }, "mode": "managed", "name": "test", "provider_config_key": "aws", "schema_version": 0, "type": "aws_iam_role", }, { "address": "aws_iam_role_policy_attachment.test-attach", "expressions": { "policy_arn": { "references": [ "aws_iam_policy.policy.arn", "aws_iam_policy.policy", ], }, "role": { "references": [ "aws_iam_role.test.name", "aws_iam_role.test", ], }, }, "mode": "managed", "name": "test-attach", "provider_config_key": "aws", "schema_version": 0, "type": "aws_iam_role_policy_attachment", }, { "address": "aws_security_group.test", "expressions": { "description": { "constant_value": "Allow TLS inbound traffic", }, "egress": { "constant_value": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": null, "from_port": 0, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": null, "protocol": "-1", "security_groups": null, "self": null, "to_port": 0, }, ], }, "ingress": { "constant_value": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "TLS from VPC", "from_port": 443, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": null, "protocol": "tcp", "security_groups": null, "self": null, "to_port": 443, }, ], }, "name": { "constant_value": "allow_tls", }, "vpc_id": { "references": [ "aws_vpc.test.id", "aws_vpc.test", ], }, }, "mode": "managed", "name": "test", "provider_config_key": "aws", "schema_version": 1, "type": "aws_security_group", }, { "address": "aws_security_group_rule.test", "expressions": { "cidr_blocks": { "constant_value": [ "0.0.0.0/0", ], }, "from_port": { "constant_value": 0, }, "protocol": { "constant_value": "tcp", }, "security_group_id": { "references": [ "aws_security_group.test.id", "aws_security_group.test", ], }, "to_port": { "constant_value": 65535, }, "type": { "constant_value": "egress", }, }, "mode": "managed", "name": "test", "provider_config_key": "aws", "schema_version": 2, "type": "aws_security_group_rule", }, { "address": "aws_subnet.test", "expressions": { "availability_zone": { "constant_value": "us-east-1a", }, "cidr_block": { "constant_value": "10.0.1.0/24", }, "vpc_id": { "references": [ "aws_vpc.test.id", "aws_vpc.test", ], }, }, "mode": "managed", "name": "test", "provider_config_key": "aws", "schema_version": 1, "type": "aws_subnet", }, { "address": "aws_vpc.test", "expressions": { "cidr_block": { "constant_value": "10.0.0.0/16", }, }, "mode": "managed", "name": "test", "provider_config_key": "aws", "schema_version": 1, "type": "aws_vpc", }, ], "variables": { "acc_id_vault": {}, "acc_short_alias": {}, "mongo_private_key": { "default": "", }, "mongo_public_key": { "default": "", }, }, }, }, "format_version": "1.0", "planned_values": { "root_module": { "resources": [ { "address": "aws_iam_policy.policy", "mode": "managed", "name": "policy", "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "sensitive_values": { "tags_all": {}, }, "type": "aws_iam_policy", "values": { "description": "A test policy", "name": "test-policy", "name_prefix": null, "path": "/", "policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": [\n \"ssm:GetParameter*\",\n \"secretsmanager:GetSecretValue\",\n \"s3:GetObject\",\n \"*\",\n \"rds:CopyDBSnapshot\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\"arn::us-east-1:*\", \"*\"]\n }\n ]\n}\n", "tags": null, }, }, { "address": "aws_iam_policy.test", "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "sensitive_values": { "tags_all": {}, }, "type": "aws_iam_policy", "values": { "description": "My sentinel test policy", "name": "test_policy", "name_prefix": null, "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"ssm:GetParameter*\",\"*\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:kms:us-east-1:563533413750:key/09ee66e1-218f-4f81-892d-a9be0ce5fdb2cd\",\"*\"]}],\"Version\":\"2012-10-17\"}", "tags": null, }, }, { "address": "aws_iam_role.test", "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "sensitive_values": { "inline_policy": [], "managed_policy_arns": [], "tags_all": {}, }, "type": "aws_iam_role", "values": { "assume_role_policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n", "description": null, "force_detach_policies": false, "max_session_duration": 3600, "name": "test-role", "path": "/", "permissions_boundary": null, "tags": null, }, }, { "address": "aws_iam_role_policy_attachment.test-attach", "mode": "managed", "name": "test-attach", "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 0, "sensitive_values": {}, "type": "aws_iam_role_policy_attachment", "values": { "role": "test-role", }, }, { "address": "aws_security_group.test", "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 1, "sensitive_values": { "egress": [ { "cidr_blocks": [ false, ], "ipv6_cidr_blocks": [ false, ], "prefix_list_ids": [], "security_groups": [], }, ], "ingress": [ { "cidr_blocks": [ false, ], "ipv6_cidr_blocks": [ false, ], "prefix_list_ids": [], "security_groups": [], }, ], "tags_all": {}, }, "type": "aws_security_group", "values": { "description": "Allow TLS inbound traffic", "egress": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "", "from_port": 0, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": [], "protocol": "-1", "security_groups": [], "self": false, "to_port": 0, }, ], "ingress": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "TLS from VPC", "from_port": 443, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [], "self": false, "to_port": 443, }, ], "name": "allow_tls", "revoke_rules_on_delete": false, "tags": null, "timeouts": null, }, }, { "address": "aws_security_group_rule.test", "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 2, "sensitive_values": { "cidr_blocks": [ false, ], }, "type": "aws_security_group_rule", "values": { "cidr_blocks": [ "0.0.0.0/0", ], "description": null, "from_port": 0, "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "self": false, "to_port": 65535, "type": "egress", }, }, { "address": "aws_subnet.test", "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 1, "sensitive_values": { "tags_all": {}, }, "type": "aws_subnet", "values": { "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1a", "cidr_block": "10.0.1.0/24", "customer_owned_ipv4_pool": null, "enable_dns64": false, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "ipv6_cidr_block": null, "ipv6_native": false, "map_customer_owned_ip_on_launch": null, "map_public_ip_on_launch": false, "outpost_arn": null, "tags": null, "timeouts": null, }, }, { "address": "aws_vpc.test", "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "schema_version": 1, "sensitive_values": { "tags_all": {}, }, "type": "aws_vpc", "values": { "assign_generated_ipv6_cidr_block": null, "cidr_block": "10.0.0.0/16", "enable_dns_support": true, "instance_tenancy": "default", "ipv4_ipam_pool_id": null, "ipv4_netmask_length": null, "ipv6_ipam_pool_id": null, "ipv6_netmask_length": null, "tags": null, }, }, ], }, }, "prior_state": { "format_version": "1.0", "terraform_version": "1.1.2", "values": { "root_module": { "child_modules": [ { "address": "module.vaultprovider", "resources": [ { "address": "module.vaultprovider.data.vault_aws_access_credentials.aws_creds", "mode": "data", "name": "aws_creds", "provider_name": "registry.terraform.io/hashicorp/vault", "schema_version": 0, "sensitive_values": {}, "type": "vault_aws_access_credentials", "values": { "access_key": "xxxxxxxxxxxxxxxxx", "backend": "aws", "id": "aws/sts/pgraws26_086957365384_admin_assumed_role/rcj65y1yaKGQSmjy6AFMD2zQ", "lease_duration": 3599, "lease_id": "aws/sts/pgraws26_086957365384_admin_assumed_role/rcj65y1yaKGQSmjy6AFMD2zQ", "lease_renewable": false, "lease_start_time": "2022-10-26T20:54:35Z", "namespace": null, "region": null, "role": "pgraws26_086957365384_admin_assumed_role", "role_arn": null, "secret_key": "xxxxxxxxxxxxxxxxx", "security_token": "xxxxxxxxxxxxxxxxx", "ttl": null, "type": "sts", }, }, ], }, ], }, }, }, "resource_changes": [ { "address": "aws_iam_policy.policy", "change": { "actions": [ "create", ], "after": { "description": "A test policy", "name": "test-policy", "name_prefix": null, "path": "/", "policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": [\n \"ssm:GetParameter*\",\n \"secretsmanager:GetSecretValue\",\n \"s3:GetObject\",\n \"*\",\n \"rds:CopyDBSnapshot\"\n ],\n \"Effect\": \"Allow\",\n \"Resource\": [\"arn::us-east-1:*\", \"*\"]\n }\n ]\n}\n", "tags": null, }, "after_sensitive": { "tags_all": {}, }, "after_unknown": { "arn": true, "id": true, "policy_id": true, "tags_all": true, }, "before": null, "before_sensitive": false, }, "mode": "managed", "name": "policy", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_iam_policy", }, { "address": "aws_iam_policy.test", "change": { "actions": [ "create", ], "after": { "description": "My sentinel test policy", "name": "test_policy", "name_prefix": null, "path": "/", "policy": "{\"Statement\":[{\"Action\":[\"ssm:GetParameter*\",\"*\"],\"Effect\":\"Allow\",\"Resource\":[\"arn:aws:kms:us-east-1:563533413750:key/09ee66e1-218f-4f81-892d-a9be0ce5fdb2cd\",\"*\"]}],\"Version\":\"2012-10-17\"}", "tags": null, }, "after_sensitive": { "tags_all": {}, }, "after_unknown": { "arn": true, "id": true, "policy_id": true, "tags_all": true, }, "before": null, "before_sensitive": false, }, "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_iam_policy", }, { "address": "aws_iam_role.test", "change": { "actions": [ "create", ], "after": { "assume_role_policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"ec2.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n", "description": null, "force_detach_policies": false, "max_session_duration": 3600, "name": "test-role", "path": "/", "permissions_boundary": null, "tags": null, }, "after_sensitive": { "inline_policy": [], "managed_policy_arns": [], "tags_all": {}, }, "after_unknown": { "arn": true, "create_date": true, "id": true, "inline_policy": true, "managed_policy_arns": true, "name_prefix": true, "tags_all": true, "unique_id": true, }, "before": null, "before_sensitive": false, }, "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_iam_role", }, { "address": "aws_iam_role_policy_attachment.test-attach", "change": { "actions": [ "create", ], "after": { "role": "test-role", }, "after_sensitive": {}, "after_unknown": { "id": true, "policy_arn": true, }, "before": null, "before_sensitive": false, }, "mode": "managed", "name": "test-attach", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_iam_role_policy_attachment", }, { "address": "aws_security_group.test", "change": { "actions": [ "create", ], "after": { "description": "Allow TLS inbound traffic", "egress": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "", "from_port": 0, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": [], "protocol": "-1", "security_groups": [], "self": false, "to_port": 0, }, ], "ingress": [ { "cidr_blocks": [ "0.0.0.0/0", ], "description": "TLS from VPC", "from_port": 443, "ipv6_cidr_blocks": [ "::/0", ], "prefix_list_ids": [], "protocol": "tcp", "security_groups": [], "self": false, "to_port": 443, }, ], "name": "allow_tls", "revoke_rules_on_delete": false, "tags": null, "timeouts": null, }, "after_sensitive": { "egress": [ { "cidr_blocks": [ false, ], "ipv6_cidr_blocks": [ false, ], "prefix_list_ids": [], "security_groups": [], }, ], "ingress": [ { "cidr_blocks": [ false, ], "ipv6_cidr_blocks": [ false, ], "prefix_list_ids": [], "security_groups": [], }, ], "tags_all": {}, }, "after_unknown": { "arn": true, "egress": [ { "cidr_blocks": [ false, ], "ipv6_cidr_blocks": [ false, ], "prefix_list_ids": [], "security_groups": [], }, ], "id": true, "ingress": [ { "cidr_blocks": [ false, ], "ipv6_cidr_blocks": [ false, ], "prefix_list_ids": [], "security_groups": [], }, ], "name_prefix": true, "owner_id": true, "tags_all": true, "vpc_id": true, }, "before": null, "before_sensitive": false, }, "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_security_group", }, { "address": "aws_security_group_rule.test", "change": { "actions": [ "create", ], "after": { "cidr_blocks": [ "0.0.0.0/0", ], "description": null, "from_port": 0, "ipv6_cidr_blocks": null, "prefix_list_ids": null, "protocol": "tcp", "self": false, "to_port": 65535, "type": "egress", }, "after_sensitive": { "cidr_blocks": [ false, ], }, "after_unknown": { "cidr_blocks": [ false, ], "id": true, "security_group_id": true, "source_security_group_id": true, }, "before": null, "before_sensitive": false, }, "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_security_group_rule", }, { "address": "aws_subnet.test", "change": { "actions": [ "create", ], "after": { "assign_ipv6_address_on_creation": false, "availability_zone": "us-east-1a", "cidr_block": "10.0.1.0/24", "customer_owned_ipv4_pool": null, "enable_dns64": false, "enable_resource_name_dns_a_record_on_launch": false, "enable_resource_name_dns_aaaa_record_on_launch": false, "ipv6_cidr_block": null, "ipv6_native": false, "map_customer_owned_ip_on_launch": null, "map_public_ip_on_launch": false, "outpost_arn": null, "tags": null, "timeouts": null, }, "after_sensitive": { "tags_all": {}, }, "after_unknown": { "arn": true, "availability_zone_id": true, "id": true, "ipv6_cidr_block_association_id": true, "owner_id": true, "private_dns_hostname_type_on_launch": true, "tags_all": true, "vpc_id": true, }, "before": null, "before_sensitive": false, }, "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_subnet", }, { "address": "aws_vpc.test", "change": { "actions": [ "create", ], "after": { "assign_generated_ipv6_cidr_block": null, "cidr_block": "10.0.0.0/16", "enable_dns_support": true, "instance_tenancy": "default", "ipv4_ipam_pool_id": null, "ipv4_netmask_length": null, "ipv6_ipam_pool_id": null, "ipv6_netmask_length": null, "tags": null, }, "after_sensitive": { "tags_all": {}, }, "after_unknown": { "arn": true, "default_network_acl_id": true, "default_route_table_id": true, "default_security_group_id": true, "dhcp_options_id": true, "enable_classiclink": true, "enable_classiclink_dns_support": true, "enable_dns_hostnames": true, "id": true, "ipv6_association_id": true, "ipv6_cidr_block": true, "ipv6_cidr_block_network_border_group": true, "main_route_table_id": true, "owner_id": true, "tags_all": true, }, "before": null, "before_sensitive": false, }, "mode": "managed", "name": "test", "provider_name": "registry.terraform.io/hashicorp/aws", "type": "aws_vpc", }, ], "terraform_version": "1.1.2", "variables": { "acc_id_vault": { "value": "086957365384", }, "acc_short_alias": { "value": "pgraws26", }, "mongo_private_key": { "value": "", }, "mongo_public_key": { "value": "", }, }, }