Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[minor] Setup Db2 Backup job for Disaster recovery scenario and Compliance/SLA in gitops #1383

Merged
merged 20 commits into from
Dec 4, 2024

Conversation

mnivedithaa
Copy link
Contributor

@mnivedithaa mnivedithaa commented Nov 28, 2024

Issue: MASCORE-4470

Description

Supports DB2 backup and initial setup scripts to be executed fior gitops deployments only. CLI populates information such as bucket name, bucket endpoint, credentials and slack url in gitops-envs. Corresponding secret path are stored in gitops-envs. SRE to create these secrets manually (Defined in https://github.ibm.com/maximoappsuite/saas/pull/37)

Gitops cos provisioning task is updated to create S3 bucket and access point for DB2 backup via terraform

ICD auth key if defined in mas-apps pipeline is created as a secret in AWS secret manager. This is used in post DB provisioning steps

Testing

  1. Tested the generation of gitops-envs with DB backup enabled and not enabled scenario using saas-tekton pipeline changes in mas-apps (https://github.ibm.com/maximoappsuite/saas-tekton/pull/79)
  2. Also tested the gitops cos provision and deprovision in OC pipelines in fvtsaas

Gitops COS Provision logs

STEP-GITOPS-COS

�[4mIBM Maximo Application Suite GitOps Manager (v11.11.1-pre.db2-backup-and-compliance)�(B�[m
Powered by �[36m�[4mhttps://github.com/ibm-mas/gitops/�(B�[m

�(B�[m�[1K
�(B�[m�[1K
�[4m1) Review Settings�(B�[m
�[2m

    �[4m2) Target�(B�[m
�(B�[m�[2m    Account ID ............................ �[35maws-dev
�(B�[m�[2m    Cluster ID ............................ �[35mfvtsaas
�(B�[m�[2m    Application Directory ................. �[35m/tmp/init-cos//fvtsaas/tmp-cos
�(B�[m�[1K�[2m

    �[4m3) Secrets Manager�(B�[m
�(B�[m�[2m    Secrets Path .......................... �[35marn:aws:secretsmanager:us-east-2:435377327995:secret
�(B�[m�[1K�[2m

    �[4m4) COS�(B�[m
�(B�[m�[2m    COS action  ........................... �[35mprovision
�(B�[m�[2m    COS type  ............................. �[35maws
�[2m

    �[4m5) IBM Maximo Application Suite�(B�[m
�(B�[m�[2m    Instance ID ............................. �[35mfvtsaas
�(B�[m�[2m    Config Dir  ............................. �[35m/workspace/configs/fvtsaas-cos
�(B�[m�[1KLogging into AWS SecretsManager ...
      Name                    Value             Type    Location
      ----                    -----             ----    --------
   profile                <not set>             None    None
access_key     ****************77FC shared-credentials-file    
secret_key     ****************AUcn shared-credentials-file    
    region                us-east-2              env    ['AWS_REGION', 'AWS_DEFAULT_REGION']
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed

  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
  3 25.7M    3  830k    0     0   524k      0  0:00:50  0:00:01  0:00:49  524k
 59 25.7M   59 15.4M    0     0  6090k      0  0:00:04  0:00:02  0:00:02 6088k
100 25.7M  100 25.7M    0     0  8497k      0  0:00:03  0:00:03 --:--:-- 8497k
Archive:  /tmp/init-cos//fvtsaas/tmp-cos/terraform_1.9.2_linux_amd64.zip
  inflating: /tmp/init-cos//fvtsaas/tmp-cos/LICENSE.txt  
  inflating: /tmp/init-cos//fvtsaas/tmp-cos/terraform  
/tmp/init-cos//fvtsaas/tmp-cos/terraform -chdir=/tmp/init-cos//fvtsaas/tmp-cos init -input=false
�[0m�[1mInitializing the backend...�[0m
�[0m�[32m
Successfully configured the backend "s3"! Terraform will automatically
use this backend unless the backend configuration changes.�[0m
�[0m�[1mInitializing modules...�[0m
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3.git?ref=1.0.1 for s3a...
- s3a in .terraform/modules/s3a/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3-access-point.git?ref=1.0.10 for s3a_access_point...
- s3a_access_point in .terraform/modules/s3a_access_point/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3.git?ref=1.0.1 for s3c...
- s3c in .terraform/modules/s3c/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3-access-point.git?ref=1.0.10 for s3c_access_point...
- s3c_access_point in .terraform/modules/s3c_access_point/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3.git?ref=1.0.1 for s3db2...
- s3db2 in .terraform/modules/s3db2/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3-access-point.git?ref=1.0.10 for s3db2_access_point...
- s3db2_access_point in .terraform/modules/s3db2_access_point/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3.git?ref=1.0.1 for s3l...
- s3l in .terraform/modules/s3l/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3-access-point.git?ref=1.0.10 for s3l_access_point...
- s3l_access_point in .terraform/modules/s3l_access_point/module
�[0m�[1mInitializing provider plugins...�[0m
- Finding hashicorp/aws versions matching ">= 4.20.0"...
- Finding hashicorp/local versions matching ">= 2.5.1"...
- Finding latest version of hashicorp/time...
- Installing hashicorp/aws v5.78.0...
- Installed hashicorp/aws v5.78.0 (signed by HashiCorp)
- Installing hashicorp/local v2.5.2...
- Installed hashicorp/local v2.5.2 (signed by HashiCorp)
- Installing hashicorp/time v0.12.1...
- Installed hashicorp/time v0.12.1 (signed by HashiCorp)
Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.�[0m

�[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
�[0m�[32m
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.�[0m
/tmp/init-cos//fvtsaas/tmp-cos/terraform -chdir=/tmp/init-cos//fvtsaas/tmp-cos plan -input=false -out=tfplan
�[0m�[1mmodule.s3db2_access_point.data.local_file.starfield_root_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert_1: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert_3: Reading...�[0m�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert_4: Reading...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.amazon_root_cert_2: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert_2: Reading...�[0m�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert_2: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.starfield_root_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert_4: Read complete after 0s [id=fbfa8212634bb7cf6497e54ee8c6b9c80d87acf7]�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert_2: Read complete after 0s [id=4ca652c0a575df35b46aac58e6c647885d33611c]�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert_3: Read complete after 0s [id=f2d47b1e788e177266c0a82ba305091d874b0f36]�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert_4: Reading...�[0m�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert_2: Read complete after 0s [id=4ca652c0a575df35b46aac58e6c647885d33611c]�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.starfield_root_cert: Read complete after 0s [id=6283f5edc0147252ce7bc39c8d6f3a864fa262b2]�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.amazon_root_cert_1: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert_4: Read complete after 0s [id=fbfa8212634bb7cf6497e54ee8c6b9c80d87acf7]�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.starfield_root_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert_4: Reading...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.starfield_root_cert: Read complete after 0s [id=6283f5edc0147252ce7bc39c8d6f3a864fa262b2]�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert_3: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert_1: Reading...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.amazon_root_cert_2: Read complete after 0s [id=4ca652c0a575df35b46aac58e6c647885d33611c]�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert_1: Read complete after 0s [id=f8c8dd283ea3e22d6071364005cc50f961ae88e0]�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.amazon_root_cert_4: Reading...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.amazon_root_cert_3: Reading...�[0m�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.starfield_root_cert: Read complete after 0s [id=6283f5edc0147252ce7bc39c8d6f3a864fa262b2]�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert_3: Read complete after 0s [id=f2d47b1e788e177266c0a82ba305091d874b0f36]�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert_3: Reading...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.amazon_root_cert_1: Read complete after 0s [id=f8c8dd283ea3e22d6071364005cc50f961ae88e0]�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.amazon_root_cert_4: Read complete after 0s [id=fbfa8212634bb7cf6497e54ee8c6b9c80d87acf7]�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert_4: Read complete after 0s [id=fbfa8212634bb7cf6497e54ee8c6b9c80d87acf7]�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert_1: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert_2: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.starfield_root_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert_1: Read complete after 0s [id=f8c8dd283ea3e22d6071364005cc50f961ae88e0]�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert_1: Read complete after 0s [id=f8c8dd283ea3e22d6071364005cc50f961ae88e0]�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert_3: Read complete after 0s [id=f2d47b1e788e177266c0a82ba305091d874b0f36]�[0m
�[0m�[1mmodule.s3db2_access_point.data.local_file.amazon_root_cert_3: Read complete after 0s [id=f2d47b1e788e177266c0a82ba305091d874b0f36]�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.starfield_root_cert: Read complete after 0s [id=6283f5edc0147252ce7bc39c8d6f3a864fa262b2]�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert_2: Read complete after 0s [id=4ca652c0a575df35b46aac58e6c647885d33611c]�[0m
�[0m�[1mmodule.s3c_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2]�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_user.s3_access_point_user: Refreshing state... [id=fvtsaas-fvtsaas-s3c-user]�[0m
�[0m�[1mmodule.s3l_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6]�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_user.s3_access_point_user: Refreshing state... [id=fvtsaas-fvtsaas-s3a-user]�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket.s3_bucket: Refreshing state... [id=fvtsaas-fvtsaas-s3c]�[0m
�[0m�[1mmodule.s3a_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa]�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket.s3_bucket: Refreshing state... [id=fvtsaas-fvtsaas-s3l]�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket.s3_bucket: Refreshing state... [id=fvtsaas-fvtsaas-s3a]�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_user.s3_access_point_user: Refreshing state... [id=fvtsaas-fvtsaas-s3l-user]�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_access_key.s3_access_point_user_key: Refreshing state... [id=AKIAWKXUCZ552LS3RU47]�[0m
�[0m�[1mmodule.s3c_access_point.time_sleep.user_propagation: Refreshing state... [id=2024-11-27T11:16:25Z]�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Refreshing state... [id=terraform-20241127111605995900000006]�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Refreshing state... [id=terraform-20241127111605865400000004]�[0m
�[0m�[1mmodule.s3a_access_point.time_sleep.user_propagation: Refreshing state... [id=2024-11-27T11:16:25Z]�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_access_key.s3_access_point_user_key: Refreshing state... [id=AKIAWKXUCZ55VOSRFJMT]�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_access_key.s3_access_point_user_key: Refreshing state... [id=AKIAWKXUCZ555YXFKRH3]�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Refreshing state... [id=terraform-20241127111605935300000005]�[0m
�[0m�[1mmodule.s3l_access_point.time_sleep.user_propagation: Refreshing state... [id=2024-11-27T11:16:25Z]�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Refreshing state... [id=fvtsaas-fvtsaas-s3c]�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket_versioning.s3_bucket_versioning: Refreshing state... [id=fvtsaas-fvtsaas-s3c]�[0m
�[0m�[1mmodule.s3c_access_point.data.aws_iam_policy_document.allow_access_for_user: Reading...�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3_access_point.s3_access_point: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3c-access]�[0m
�[0m�[1mmodule.s3c_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_cos[0]: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2|terraform-20241127111607012000000007]�[0m
�[0m�[1mmodule.s3c_access_point.data.aws_iam_policy_document.allow_access_for_user: Read complete after 0s [id=1183449204]�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3_bucket_policy.allow_access_for_user: Refreshing state... [id=fvtsaas-fvtsaas-s3c]�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Refreshing state... [id=fvtsaas-fvtsaas-s3a]�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket_versioning.s3_bucket_versioning: Refreshing state... [id=fvtsaas-fvtsaas-s3a]�[0m
�[0m�[1mmodule.s3a_access_point.data.aws_iam_policy_document.allow_access_for_user: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3_access_point.s3_access_point: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3a-access]�[0m
�[0m�[1mmodule.s3a_access_point.data.aws_iam_policy_document.allow_access_for_user: Read complete after 0s [id=2956928436]�[0m
�[0m�[1mmodule.s3a_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa|terraform-20241127111607534800000009]�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3_bucket_policy.allow_access_for_user: Refreshing state... [id=fvtsaas-fvtsaas-s3a]�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket_versioning.s3_bucket_versioning: Refreshing state... [id=fvtsaas-fvtsaas-s3l]�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Refreshing state... [id=fvtsaas-fvtsaas-s3l]�[0m
�[0m�[1mmodule.s3l_access_point.data.aws_iam_policy_document.allow_access_for_user: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6|terraform-20241127111607440200000008]�[0m
�[0m�[1mmodule.s3l_access_point.data.aws_iam_policy_document.allow_access_for_user: Read complete after 0s [id=2437439767]�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3_access_point.s3_access_point: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3l-access]�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3_bucket_policy.allow_access_for_user: Refreshing state... [id=fvtsaas-fvtsaas-s3l]�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3a-access]�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3l-access]�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3c-access]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[32m+�[0m create�[0m
 �[36m<=�[0m read (data resources)�[0m

Terraform will perform the following actions:

�[1m  # module.s3db2.aws_s3_bucket.s3_bucket�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_bucket" "s3_bucket" {
      �[32m+�[0m�[0m acceleration_status         = (known after apply)
      �[32m+�[0m�[0m acl                         = (known after apply)
      �[32m+�[0m�[0m arn                         = (known after apply)
      �[32m+�[0m�[0m bucket                      = "fvtsaas-fvtsaas-s3db2"
      �[32m+�[0m�[0m bucket_domain_name          = (known after apply)
      �[32m+�[0m�[0m bucket_prefix               = (known after apply)
      �[32m+�[0m�[0m bucket_regional_domain_name = (known after apply)
      �[32m+�[0m�[0m force_destroy               = true
      �[32m+�[0m�[0m hosted_zone_id              = (known after apply)
      �[32m+�[0m�[0m id                          = (known after apply)
      �[32m+�[0m�[0m object_lock_enabled         = (known after apply)
      �[32m+�[0m�[0m policy                      = (known after apply)
      �[32m+�[0m�[0m region                      = (known after apply)
      �[32m+�[0m�[0m request_payer               = (known after apply)
      �[32m+�[0m�[0m tags                        = {
          �[32m+�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[32m+�[0m�[0m "contact"     = "[email protected]"
          �[32m+�[0m�[0m "cost-center" = "12345"
          �[32m+�[0m�[0m "environment" = "dev"
          �[32m+�[0m�[0m "owner"       = "productteam"
          �[32m+�[0m�[0m "source"      = "terraform"
        }
      �[32m+�[0m�[0m tags_all                    = {
          �[32m+�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[32m+�[0m�[0m "contact"     = "[email protected]"
          �[32m+�[0m�[0m "cost-center" = "12345"
          �[32m+�[0m�[0m "environment" = "dev"
          �[32m+�[0m�[0m "owner"       = "productteam"
          �[32m+�[0m�[0m "source"      = "terraform"
        }
      �[32m+�[0m�[0m website_domain              = (known after apply)
      �[32m+�[0m�[0m website_endpoint            = (known after apply)

      �[32m+�[0m�[0m cors_rule (known after apply)

      �[32m+�[0m�[0m grant (known after apply)

      �[32m+�[0m�[0m lifecycle_rule (known after apply)

      �[32m+�[0m�[0m logging (known after apply)

      �[32m+�[0m�[0m object_lock_configuration (known after apply)

      �[32m+�[0m�[0m replication_configuration (known after apply)

      �[32m+�[0m�[0m server_side_encryption_configuration (known after apply)

      �[32m+�[0m�[0m versioning (known after apply)

      �[32m+�[0m�[0m website (known after apply)
    }

�[1m  # module.s3db2.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_bucket_server_side_encryption_configuration" "s3_bucket_enable_encryption" {
      �[32m+�[0m�[0m bucket = (known after apply)
      �[32m+�[0m�[0m id     = (known after apply)

      �[32m+�[0m�[0m rule {
          �[32m+�[0m�[0m apply_server_side_encryption_by_default {
              �[32m+�[0m�[0m sse_algorithm     = "AES256"
                �[90m# (1 unchanged attribute hidden)�[0m�[0m
            }
        }
    }

�[1m  # module.s3db2.aws_s3_bucket_versioning.s3_bucket_versioning�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_bucket_versioning" "s3_bucket_versioning" {
      �[32m+�[0m�[0m bucket = (known after apply)
      �[32m+�[0m�[0m id     = (known after apply)

      �[32m+�[0m�[0m versioning_configuration {
          �[32m+�[0m�[0m mfa_delete = (known after apply)
          �[32m+�[0m�[0m status     = "Enabled"
        }
    }

�[1m  # module.s3db2_access_point.data.aws_iam_policy_document.allow_access_for_user�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "aws_iam_policy_document" "allow_access_for_user" {
      �[32m+�[0m�[0m id            = (known after apply)
      �[32m+�[0m�[0m json          = (known after apply)
      �[32m+�[0m�[0m minified_json = (known after apply)

      �[32m+�[0m�[0m statement {
          �[32m+�[0m�[0m actions   = [
              �[32m+�[0m�[0m "s3:DeleteObject",
              �[32m+�[0m�[0m "s3:GetObject",
              �[32m+�[0m�[0m "s3:GetObjectAcl",
              �[32m+�[0m�[0m "s3:ListBucket",
              �[32m+�[0m�[0m "s3:PutObject",
              �[32m+�[0m�[0m "s3:PutObjectAcl",
            ]
          �[32m+�[0m�[0m resources = [
              �[32m+�[0m�[0m (known after apply),
              �[32m+�[0m�[0m (known after apply),
            ]

          �[32m+�[0m�[0m principals {
              �[32m+�[0m�[0m identifiers = [
                  �[32m+�[0m�[0m (known after apply),
                ]
              �[32m+�[0m�[0m type        = "AWS"
            }
        }
    }

�[1m  # module.s3db2_access_point.aws_iam_access_key.s3_access_point_user_key�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_iam_access_key" "s3_access_point_user_key" {
      �[32m+�[0m�[0m create_date                    = (known after apply)
      �[32m+�[0m�[0m encrypted_secret               = (known after apply)
      �[32m+�[0m�[0m encrypted_ses_smtp_password_v4 = (known after apply)
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m key_fingerprint                = (known after apply)
      �[32m+�[0m�[0m secret                         = (sensitive value)
      �[32m+�[0m�[0m ses_smtp_password_v4           = (sensitive value)
      �[32m+�[0m�[0m status                         = "Active"
      �[32m+�[0m�[0m user                           = "fvtsaas-fvtsaas-s3db2-user"
    }

�[1m  # module.s3db2_access_point.aws_iam_user.s3_access_point_user�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_iam_user" "s3_access_point_user" {
      �[32m+�[0m�[0m arn           = (known after apply)
      �[32m+�[0m�[0m force_destroy = false
      �[32m+�[0m�[0m id            = (known after apply)
      �[32m+�[0m�[0m name          = "fvtsaas-fvtsaas-s3db2-user"
      �[32m+�[0m�[0m path          = "/"
      �[32m+�[0m�[0m tags          = {
          �[32m+�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[32m+�[0m�[0m "contact"     = "[email protected]"
          �[32m+�[0m�[0m "cost-center" = "12345"
          �[32m+�[0m�[0m "environment" = "dev"
          �[32m+�[0m�[0m "owner"       = "productteam"
          �[32m+�[0m�[0m "source"      = "terraform"
        }
      �[32m+�[0m�[0m tags_all      = {
          �[32m+�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[32m+�[0m�[0m "contact"     = "[email protected]"
          �[32m+�[0m�[0m "cost-center" = "12345"
          �[32m+�[0m�[0m "environment" = "dev"
          �[32m+�[0m�[0m "owner"       = "productteam"
          �[32m+�[0m�[0m "source"      = "terraform"
        }
      �[32m+�[0m�[0m unique_id     = (known after apply)
    }

�[1m  # module.s3db2_access_point.aws_iam_user_group_membership.s3_policy_group_membership�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_iam_user_group_membership" "s3_policy_group_membership" {
      �[32m+�[0m�[0m groups = [
          �[32m+�[0m�[0m "MCSP_S3_IAM_Group",
        ]
      �[32m+�[0m�[0m id     = (known after apply)
      �[32m+�[0m�[0m user   = "fvtsaas-fvtsaas-s3db2-user"
    }

�[1m  # module.s3db2_access_point.aws_s3_access_point.s3_access_point�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_access_point" "s3_access_point" {
      �[32m+�[0m�[0m account_id               = (known after apply)
      �[32m+�[0m�[0m alias                    = (known after apply)
      �[32m+�[0m�[0m arn                      = (known after apply)
      �[32m+�[0m�[0m bucket                   = (known after apply)
      �[32m+�[0m�[0m bucket_account_id        = (known after apply)
      �[32m+�[0m�[0m domain_name              = (known after apply)
      �[32m+�[0m�[0m endpoints                = (known after apply)
      �[32m+�[0m�[0m has_public_access_policy = (known after apply)
      �[32m+�[0m�[0m id                       = (known after apply)
      �[32m+�[0m�[0m name                     = "fvtsaas-fvtsaas-s3db2-access"
      �[32m+�[0m�[0m network_origin           = (known after apply)
      �[32m+�[0m�[0m policy                   = (known after apply)
    }

�[1m  # module.s3db2_access_point.aws_s3_bucket_policy.allow_access_for_user�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3_bucket_policy" "allow_access_for_user" {
      �[32m+�[0m�[0m bucket = (known after apply)
      �[32m+�[0m�[0m id     = (known after apply)
      �[32m+�[0m�[0m policy = (known after apply)
    }

�[1m  # module.s3db2_access_point.aws_s3control_access_point_policy.s3_access_point_policy�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_s3control_access_point_policy" "s3_access_point_policy" {
      �[32m+�[0m�[0m access_point_arn         = (known after apply)
      �[32m+�[0m�[0m has_public_access_policy = (known after apply)
      �[32m+�[0m�[0m id                       = (known after apply)
      �[32m+�[0m�[0m policy                   = (known after apply)
    }

�[1m  # module.s3db2_access_point.aws_secretsmanager_secret.s3_bucket_access_secret�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_secretsmanager_secret" "s3_bucket_access_secret" {
      �[32m+�[0m�[0m arn                            = (known after apply)
      �[32m+�[0m�[0m force_overwrite_replica_secret = false
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m name                           = "aws-dev/fvtsaas/fvtsaas/db2_backup"
      �[32m+�[0m�[0m name_prefix                    = (known after apply)
      �[32m+�[0m�[0m policy                         = (known after apply)
      �[32m+�[0m�[0m recovery_window_in_days        = 0
      �[32m+�[0m�[0m tags                           = {
          �[32m+�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/db2_backup"
          �[32m+�[0m�[0m "contact"     = "[email protected]"
          �[32m+�[0m�[0m "cost-center" = "12345"
          �[32m+�[0m�[0m "environment" = "dev"
          �[32m+�[0m�[0m "owner"       = "productteam"
          �[32m+�[0m�[0m "source"      = "terraform"
        }
      �[32m+�[0m�[0m tags_all                       = {
          �[32m+�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/db2_backup"
          �[32m+�[0m�[0m "contact"     = "[email protected]"
          �[32m+�[0m�[0m "cost-center" = "12345"
          �[32m+�[0m�[0m "environment" = "dev"
          �[32m+�[0m�[0m "owner"       = "productteam"
          �[32m+�[0m�[0m "source"      = "terraform"
        }

      �[32m+�[0m�[0m replica (known after apply)
    }

�[1m  # module.s3db2_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "aws_secretsmanager_secret_version" "s3_bucket_access_secret_version_manage" {
      �[32m+�[0m�[0m arn            = (known after apply)
      �[32m+�[0m�[0m id             = (known after apply)
      �[32m+�[0m�[0m secret_id      = (known after apply)
      �[32m+�[0m�[0m secret_string  = (sensitive value)
      �[32m+�[0m�[0m version_id     = (known after apply)
      �[32m+�[0m�[0m version_stages = (known after apply)
    }

�[1m  # module.s3db2_access_point.time_sleep.user_propagation�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "user_propagation" {
      �[32m+�[0m�[0m create_duration = "20s"
      �[32m+�[0m�[0m id              = (known after apply)
      �[32m+�[0m�[0m triggers        = {
          �[32m+�[0m�[0m "user_arn" = (known after apply)
        }
    }

�[1mPlan:�[0m 12 to add, 0 to change, 0 to destroy.
�[0m
Changes to Outputs:
  �[32m+�[0m�[0m s3db2              = {
      �[32m+�[0m�[0m s3_bucket_arn                         = (known after apply)
      �[32m+�[0m�[0m s3_bucket_bucket_domain_name          = (known after apply)
      �[32m+�[0m�[0m s3_bucket_bucket_regional_domain_name = (known after apply)
      �[32m+�[0m�[0m s3_bucket_hosted_zone_id              = (known after apply)
      �[32m+�[0m�[0m s3_bucket_id                          = (known after apply)
      �[32m+�[0m�[0m s3_bucket_region                      = (known after apply)
    }
  �[32m+�[0m�[0m s3db2_access_point = {
      �[32m+�[0m�[0m s3_access_point_alias  = (known after apply)
      �[32m+�[0m�[0m s3_access_point_arn    = (known after apply)
      �[32m+�[0m�[0m s3_access_point_domain = (known after apply)
    }
�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Saved the plan to: tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "tfplan"
/tmp/init-cos//fvtsaas/tmp-cos/terraform -chdir=/tmp/init-cos//fvtsaas/tmp-cos apply -auto-approve -input=false tfplan
�[0m�[1mmodule.s3db2_access_point.aws_iam_user.s3_access_point_user: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket.s3_bucket: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user.s3_access_point_user: Creation complete after 1s [id=fvtsaas-fvtsaas-s3db2-user]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_access_key.s3_access_point_user_key: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.time_sleep.user_propagation: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Creation complete after 1s [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_access_key.s3_access_point_user_key: Creation complete after 0s [id=AKIAWKXUCZ55YUPVID6B]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Creation complete after 0s [id=terraform-20241127132852750700000002]�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket.s3_bucket: Creation complete after 2s [id=fvtsaas-fvtsaas-s3db2]�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_versioning.s3_bucket_versioning: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_access_point.s3_access_point: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Creation complete after 0s [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7|terraform-20241127132853879300000003]�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Creation complete after 0s [id=fvtsaas-fvtsaas-s3db2]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_access_point.s3_access_point: Creation complete after 0s [id=435377327995:fvtsaas-fvtsaas-s3db2-access]�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_versioning.s3_bucket_versioning: Creation complete after 1s [id=fvtsaas-fvtsaas-s3db2]�[0m
�[0m�[1mmodule.s3db2_access_point.time_sleep.user_propagation: Still creating... [10s elapsed]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.time_sleep.user_propagation: Still creating... [20s elapsed]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.time_sleep.user_propagation: Creation complete after 20s [id=2024-11-27T13:29:12Z]�[0m
�[0m�[1mmodule.s3db2_access_point.data.aws_iam_policy_document.allow_access_for_user: Reading...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.data.aws_iam_policy_document.allow_access_for_user: Read complete after 0s [id=1941716061]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_bucket_policy.allow_access_for_user: Creating...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Creation complete after 0s [id=435377327995:fvtsaas-fvtsaas-s3db2-access]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_bucket_policy.allow_access_for_user: Creation complete after 0s [id=fvtsaas-fvtsaas-s3db2]�[0m
�[0m�[1m�[32m
Apply complete! Resources: 12 added, 0 changed, 0 destroyed.
�[0m�[0m�[1m�[32m
Outputs:

�[0ms3a = {
  "s3_bucket_arn" = "arn:aws:s3:::fvtsaas-fvtsaas-s3a"
  "s3_bucket_bucket_domain_name" = "fvtsaas-fvtsaas-s3a.s3.amazonaws.com"
  "s3_bucket_bucket_regional_domain_name" = "fvtsaas-fvtsaas-s3a.s3.us-east-2.amazonaws.com"
  "s3_bucket_hosted_zone_id" = "Z2O1EMRO9K5GLX"
  "s3_bucket_id" = "fvtsaas-fvtsaas-s3a"
  "s3_bucket_region" = "us-east-2"
}
s3a_access_point = {
  "s3_access_point_alias" = "fvtsaas-fvtsaas-s3a-5mujyxurko4afuzgqbpk6mf79hyu6use2b-s3alias"
  "s3_access_point_arn" = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3a-access"
  "s3_access_point_domain" = "fvtsaas-fvtsaas-s3a-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com"
}
s3c = {
  "s3_bucket_arn" = "arn:aws:s3:::fvtsaas-fvtsaas-s3a"
  "s3_bucket_bucket_domain_name" = "fvtsaas-fvtsaas-s3a.s3.amazonaws.com"
  "s3_bucket_bucket_regional_domain_name" = "fvtsaas-fvtsaas-s3a.s3.us-east-2.amazonaws.com"
  "s3_bucket_hosted_zone_id" = "Z2O1EMRO9K5GLX"
  "s3_bucket_id" = "fvtsaas-fvtsaas-s3a"
  "s3_bucket_region" = "us-east-2"
}
s3c_access_point = {
  "s3_access_point_alias" = "fvtsaas-fvtsaas-s3c-am5gxzfjp7bq5p3n8diijtabz1ps4use2b-s3alias"
  "s3_access_point_arn" = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3c-access"
  "s3_access_point_domain" = "fvtsaas-fvtsaas-s3c-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com"
}
s3db2 = {
  "s3_bucket_arn" = "arn:aws:s3:::fvtsaas-fvtsaas-s3db2"
  "s3_bucket_bucket_domain_name" = "fvtsaas-fvtsaas-s3db2.s3.amazonaws.com"
  "s3_bucket_bucket_regional_domain_name" = "fvtsaas-fvtsaas-s3db2.s3.us-east-2.amazonaws.com"
  "s3_bucket_hosted_zone_id" = "Z2O1EMRO9K5GLX"
  "s3_bucket_id" = "fvtsaas-fvtsaas-s3db2"
  "s3_bucket_region" = "us-east-2"
}
s3db2_access_point = {
  "s3_access_point_alias" = "fvtsaas-fvtsaas-s3db-3wbk7a98565szfkm7btniq4wr69whuse2b-s3alias"
  "s3_access_point_arn" = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3db2-access"
  "s3_access_point_domain" = "fvtsaas-fvtsaas-s3db2-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com"
}
s3l = {
  "s3_bucket_arn" = "arn:aws:s3:::fvtsaas-fvtsaas-s3l"
  "s3_bucket_bucket_domain_name" = "fvtsaas-fvtsaas-s3l.s3.amazonaws.com"
  "s3_bucket_bucket_regional_domain_name" = "fvtsaas-fvtsaas-s3l.s3.us-east-2.amazonaws.com"
  "s3_bucket_hosted_zone_id" = "Z2O1EMRO9K5GLX"
  "s3_bucket_id" = "fvtsaas-fvtsaas-s3l"
  "s3_bucket_region" = "us-east-2"
}
s3l_access_point = {
  "s3_access_point_alias" = "fvtsaas-fvtsaas-s3l-yicyi1he81ykrm5wgxdf1cf3d87owuse2b-s3alias"
  "s3_access_point_arn" = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3l-access"
  "s3_access_point_domain" = "fvtsaas-fvtsaas-s3l-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com"
}

Gitops COS deprovision logs

STEP-GITOPS-DEPROVISION-COS

�[4mIBM Maximo Application Suite GitOps Manager (v11.11.1-pre.db2-backup-and-compliance)�(B�[m
Powered by �[36m�[4mhttps://github.com/ibm-mas/gitops/�(B�[m

�(B�[m�[1K
�(B�[m�[1K
�[4m1) Review Settings�(B�[m
�[2m

    �[4m2) Target�(B�[m
�(B�[m�[2m    Account ID ............................ �[35maws-dev
�(B�[m�[2m    Cluster ID ............................ �[35mfvtsaas
�(B�[m�[2m    Application Directory ................. �[35m/tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision
�(B�[m�[1K�[2m

    �[4m3) Secrets Manager�(B�[m
�(B�[m�[2m    Secrets Path .......................... �[35marn:aws:secretsmanager:us-east-2:435377327995:secret
�(B�[m�[1K�[2m

    �[4m4) COS�(B�[m
�(B�[m�[2m    COS action  ........................... �[35m
�(B�[m�[2m    COS type  ............................. �[35maws
�(B�[m�[2m    COS Resource Group  ................... �[35m
�(B�[m�[2m    COS ApiKey ............................ �[35m<snip>
�[2m

    �[4m5) IBM Maximo Application Suite�(B�[m
�(B�[m�[2m    Instance ID ............................. �[35mfvtsaas
�(B�[m�[1KLogging into AWS SecretsManager ...
      Name                    Value             Type    Location
      ----                    -----             ----    --------
   profile                <not set>             None    None
access_key     ****************77FC shared-credentials-file    
secret_key     ****************AUcn shared-credentials-file    
    region                us-east-2              env    ['AWS_REGION', 'AWS_DEFAULT_REGION']
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed

  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100 25.7M  100 25.7M    0     0  44.5M      0 --:--:-- --:--:-- --:--:-- 44.5M
Archive:  /tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision/terraform_1.9.2_linux_amd64.zip
  inflating: /tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision/LICENSE.txt  
  inflating: /tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision/terraform  
/tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision/terraform -chdir=/tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision init -input=false
�[0m�[1mInitializing the backend...�[0m
�[0m�[32m
Successfully configured the backend "s3"! Terraform will automatically
use this backend unless the backend configuration changes.�[0m
�[0m�[1mInitializing modules...�[0m
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3.git?ref=1.0.1 for s3a...
- s3a in .terraform/modules/s3a/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3-access-point.git?ref=1.0.8 for s3a_access_point...
- s3a_access_point in .terraform/modules/s3a_access_point/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3.git?ref=1.0.1 for s3c...
- s3c in .terraform/modules/s3c/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3-access-point.git?ref=1.0.8 for s3c_access_point...
- s3c_access_point in .terraform/modules/s3c_access_point/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3.git?ref=1.0.1 for s3l...
- s3l in .terraform/modules/s3l/module
Downloading git::https://git:[email protected]/maximoappsuite/mas-iac-aws-s3-access-point.git?ref=1.0.8 for s3l_access_point...
- s3l_access_point in .terraform/modules/s3l_access_point/module
�[0m�[1mInitializing provider plugins...�[0m
- Finding latest version of hashicorp/time...
- Finding hashicorp/aws versions matching ">= 4.20.0"...
- Finding hashicorp/local versions matching ">= 2.5.1"...
- Installing hashicorp/local v2.5.2...
- Installed hashicorp/local v2.5.2 (signed by HashiCorp)
- Installing hashicorp/time v0.12.1...
- Installed hashicorp/time v0.12.1 (signed by HashiCorp)
- Installing hashicorp/aws v5.78.0...
- Installed hashicorp/aws v5.78.0 (signed by HashiCorp)
Terraform has created a lock file �[1m.terraform.lock.hcl�[0m to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.�[0m

�[0m�[1m�[32mTerraform has been successfully initialized!�[0m�[32m�[0m
�[0m�[32m
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.�[0m
/tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision/terraform -chdir=/tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision plan -destroy -input=false -out=tfplan
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.time_sleep.user_propagation: Refreshing state... [id=2024-11-27T13:29:12Z]�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_m01_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_m01_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_m01_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert: Reading...�[0m�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_root_cert: Read complete after 0s [id=f8c8dd283ea3e22d6071364005cc50f961ae88e0]�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_m01_cert: Read complete after 0s [id=bb0fe20f0e43173d29fdee7d42d7a08a8e20c732]�[0m
�[0m�[1mmodule.s3l_access_point.data.local_file.amazon_root_cert: Read complete after 0s [id=f8c8dd283ea3e22d6071364005cc50f961ae88e0]�[0m
�[0m�[1mmodule.s3c_access_point.data.local_file.amazon_m01_cert: Read complete after 0s [id=bb0fe20f0e43173d29fdee7d42d7a08a8e20c732]�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_root_cert: Read complete after 0s [id=f8c8dd283ea3e22d6071364005cc50f961ae88e0]�[0m
�[0m�[1mmodule.s3a_access_point.data.local_file.amazon_m01_cert: Read complete after 0s [id=bb0fe20f0e43173d29fdee7d42d7a08a8e20c732]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3db2-access]�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_versioning.s3_bucket_versioning: Refreshing state... [id=fvtsaas-fvtsaas-s3db2]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_access_key.s3_access_point_user_key: Refreshing state... [id=AKIAWKXUCZ55YUPVID6B]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_access_point.s3_access_point: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3db2-access]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Refreshing state... [id=terraform-20241127132852750700000002]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7|terraform-20241127132853879300000003]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_bucket_policy.allow_access_for_user: Refreshing state... [id=fvtsaas-fvtsaas-s3db2]�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user.s3_access_point_user: Refreshing state... [id=fvtsaas-fvtsaas-s3db2-user]�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Refreshing state... [id=fvtsaas-fvtsaas-s3db2]�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_user.s3_access_point_user: Refreshing state... [id=fvtsaas-fvtsaas-s3a-user]�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket.s3_bucket: Refreshing state... [id=fvtsaas-fvtsaas-s3db2]�[0m
�[0m�[1mmodule.s3a_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa]�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket.s3_bucket: Refreshing state... [id=fvtsaas-fvtsaas-s3l]�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket.s3_bucket: Refreshing state... [id=fvtsaas-fvtsaas-s3c]�[0m
�[0m�[1mmodule.s3c_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2]�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket.s3_bucket: Refreshing state... [id=fvtsaas-fvtsaas-s3a]�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_user.s3_access_point_user: Refreshing state... [id=fvtsaas-fvtsaas-s3c-user]�[0m
�[0m�[1mmodule.s3l_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6]�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_user.s3_access_point_user: Refreshing state... [id=fvtsaas-fvtsaas-s3l-user]�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_access_key.s3_access_point_user_key: Refreshing state... [id=AKIAWKXUCZ55VOSRFJMT]�[0m
�[0m�[1mmodule.s3a_access_point.time_sleep.user_propagation: Refreshing state... [id=2024-11-27T11:16:25Z]�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Refreshing state... [id=terraform-20241127111605865400000004]�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_access_key.s3_access_point_user_key: Refreshing state... [id=AKIAWKXUCZ552LS3RU47]�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Refreshing state... [id=terraform-20241127111605995900000006]�[0m
�[0m�[1mmodule.s3c_access_point.time_sleep.user_propagation: Refreshing state... [id=2024-11-27T11:16:25Z]�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_access_key.s3_access_point_user_key: Refreshing state... [id=AKIAWKXUCZ555YXFKRH3]�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Refreshing state... [id=terraform-20241127111605935300000005]�[0m
�[0m�[1mmodule.s3l_access_point.time_sleep.user_propagation: Refreshing state... [id=2024-11-27T11:16:25Z]�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3_access_point.s3_access_point: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3l-access]�[0m
�[0m�[1mmodule.s3l_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6|terraform-20241127111607440200000008]�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket_versioning.s3_bucket_versioning: Refreshing state... [id=fvtsaas-fvtsaas-s3l]�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Refreshing state... [id=fvtsaas-fvtsaas-s3l]�[0m
�[0m�[1mmodule.s3l_access_point.data.aws_iam_policy_document.allow_access_for_user: Reading...�[0m�[0m
�[0m�[1mmodule.s3l_access_point.data.aws_iam_policy_document.allow_access_for_user: Read complete after 0s [id=2437439767]�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3_bucket_policy.allow_access_for_user: Refreshing state... [id=fvtsaas-fvtsaas-s3l]�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket_versioning.s3_bucket_versioning: Refreshing state... [id=fvtsaas-fvtsaas-s3a]�[0m
�[0m�[1mmodule.s3a_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa|terraform-20241127111607534800000009]�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Refreshing state... [id=fvtsaas-fvtsaas-s3a]�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3_access_point.s3_access_point: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3a-access]�[0m
�[0m�[1mmodule.s3a_access_point.data.aws_iam_policy_document.allow_access_for_user: Reading...�[0m�[0m
�[0m�[1mmodule.s3a_access_point.data.aws_iam_policy_document.allow_access_for_user: Read complete after 0s [id=2956928436]�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3_bucket_policy.allow_access_for_user: Refreshing state... [id=fvtsaas-fvtsaas-s3a]�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket_versioning.s3_bucket_versioning: Refreshing state... [id=fvtsaas-fvtsaas-s3c]�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Refreshing state... [id=fvtsaas-fvtsaas-s3c]�[0m
�[0m�[1mmodule.s3c_access_point.data.aws_iam_policy_document.allow_access_for_user: Reading...�[0m�[0m
�[0m�[1mmodule.s3c_access_point.data.aws_iam_policy_document.allow_access_for_user: Read complete after 0s [id=1183449204]�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3_bucket_policy.allow_access_for_user: Refreshing state... [id=fvtsaas-fvtsaas-s3c]�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3_access_point.s3_access_point: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3c-access]�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3l-access]�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3a-access]�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Refreshing state... [id=435377327995:fvtsaas-fvtsaas-s3c-access]�[0m
�[0m�[1mmodule.s3c_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_cos[0]: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2|terraform-20241127111607012000000007]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[31m-�[0m destroy�[0m

Terraform will perform the following actions:

�[1m  # module.s3a.aws_s3_bucket.s3_bucket�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket" "s3_bucket" {
      �[31m-�[0m�[0m arn                         = "arn:aws:s3:::fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket                      = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_domain_name          = "fvtsaas-fvtsaas-s3a.s3.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_regional_domain_name = "fvtsaas-fvtsaas-s3a.s3.us-east-2.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_destroy               = true �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m hosted_zone_id              = "Z2O1EMRO9K5GLX" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                          = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m object_lock_enabled         = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                      = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:ListBucket",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:DeleteObject",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3a-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3a/*",
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3a",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m region                      = "us-east-2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m request_payer               = "BucketOwner" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                        = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all                    = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
        �[90m# (2 unchanged attributes hidden)�[0m�[0m

      �[31m-�[0m�[0m grant {
          �[31m-�[0m�[0m id          = "3bbf14d25f8c6dc8258bde5ab36085752d6a49a2f40a4a7578382c0965ab4228" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m permissions = [
              �[31m-�[0m�[0m "FULL_CONTROL",
            ] �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m type        = "CanonicalUser" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }

      �[31m-�[0m�[0m server_side_encryption_configuration {
          �[31m-�[0m�[0m rule {
              �[31m-�[0m�[0m bucket_key_enabled = false �[90m-> null�[0m�[0m

              �[31m-�[0m�[0m apply_server_side_encryption_by_default {
                  �[31m-�[0m�[0m sse_algorithm     = "AES256" �[90m-> null�[0m�[0m
                    �[90m# (1 unchanged attribute hidden)�[0m�[0m
                }
            }
        }

      �[31m-�[0m�[0m versioning {
          �[31m-�[0m�[0m enabled    = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m mfa_delete = false �[90m-> null�[0m�[0m
        }
    }

�[1m  # module.s3a.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_server_side_encryption_configuration" "s3_bucket_enable_encryption" {
      �[31m-�[0m�[0m bucket                = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                    = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[31m-�[0m�[0m rule {
          �[31m-�[0m�[0m bucket_key_enabled = false �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m apply_server_side_encryption_by_default {
              �[31m-�[0m�[0m sse_algorithm     = "AES256" �[90m-> null�[0m�[0m
                �[90m# (1 unchanged attribute hidden)�[0m�[0m
            }
        }
    }

�[1m  # module.s3a.aws_s3_bucket_versioning.s3_bucket_versioning�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_versioning" "s3_bucket_versioning" {
      �[31m-�[0m�[0m bucket                = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                    = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[31m-�[0m�[0m versioning_configuration {
          �[31m-�[0m�[0m status     = "Enabled" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }
    }

�[1m  # module.s3a_access_point.aws_iam_access_key.s3_access_point_user_key�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_access_key" "s3_access_point_user_key" {
      �[31m-�[0m�[0m create_date          = "2024-11-27T11:16:05Z" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                   = "AKIAWKXUCZ55VOSRFJMT" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret               = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m ses_smtp_password_v4 = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m status               = "Active" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m user                 = "fvtsaas-fvtsaas-s3a-user" �[90m-> null�[0m�[0m
    }

�[1m  # module.s3a_access_point.aws_iam_user.s3_access_point_user�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_user" "s3_access_point_user" {
      �[31m-�[0m�[0m arn                  = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3a-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_destroy        = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                   = "fvtsaas-fvtsaas-s3a-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                 = "fvtsaas-fvtsaas-s3a-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m path                 = "/" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                 = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all             = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m unique_id            = "AIDAWKXUCZ554YYZDRVZJ" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.s3a_access_point.aws_iam_user_group_membership.s3_policy_group_membership�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_user_group_membership" "s3_policy_group_membership" {
      �[31m-�[0m�[0m groups = [
          �[31m-�[0m�[0m "MCSP_S3_IAM_Group",
        ] �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id     = "terraform-20241127111605865400000004" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m user   = "fvtsaas-fvtsaas-s3a-user" �[90m-> null�[0m�[0m
    }

�[1m  # module.s3a_access_point.aws_s3_access_point.s3_access_point�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_access_point" "s3_access_point" {
      �[31m-�[0m�[0m account_id               = "435377327995" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m alias                    = "fvtsaas-fvtsaas-s3a-5mujyxurko4afuzgqbpk6mf79hyu6use2b-s3alias" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m arn                      = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3a-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket                   = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_account_id        = "435377327995" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m domain_name              = "fvtsaas-fvtsaas-s3a-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m endpoints                = {
          �[31m-�[0m�[0m "dualstack"      = "s3-accesspoint.dualstack.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "fips"           = "s3-accesspoint-fips.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "fips_dualstack" = "s3-accesspoint-fips.dualstack.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "ipv4"           = "s3-accesspoint.us-east-2.amazonaws.com"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m has_public_access_policy = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                       = "435377327995:fvtsaas-fvtsaas-s3a-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                     = "fvtsaas-fvtsaas-s3a-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m network_origin           = "Internet" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                   = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:DeleteObject",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:ListBucket",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3a-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3a-access/object/*",
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3a-access",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m

      �[31m-�[0m�[0m public_access_block_configuration {
          �[31m-�[0m�[0m block_public_acls       = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m block_public_policy     = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m ignore_public_acls      = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m restrict_public_buckets = true �[90m-> null�[0m�[0m
        }
    }

�[1m  # module.s3a_access_point.aws_s3_bucket_policy.allow_access_for_user�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_policy" "allow_access_for_user" {
      �[31m-�[0m�[0m bucket = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id     = "fvtsaas-fvtsaas-s3a" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:ListBucket",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:DeleteObject",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3a-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3a/*",
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3a",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
    }

�[1m  # module.s3a_access_point.aws_s3control_access_point_policy.s3_access_point_policy�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3control_access_point_policy" "s3_access_point_policy" {
      �[31m-�[0m�[0m access_point_arn         = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3a-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m has_public_access_policy = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                       = "435377327995:fvtsaas-fvtsaas-s3a-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                   = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:DeleteObject",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:ListBucket",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3a-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3a-access/object/*",
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3a-access",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
    }

�[1m  # module.s3a_access_point.aws_secretsmanager_secret.s3_bucket_access_secret�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_secretsmanager_secret" "s3_bucket_access_secret" {
      �[31m-�[0m�[0m arn                            = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_overwrite_replica_secret = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                             = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                           = "aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m recovery_window_in_days        = 0 �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                           = {
          �[31m-�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all                       = {
          �[31m-�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
        �[90m# (4 unchanged attributes hidden)�[0m�[0m
    }

�[1m  # module.s3a_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_secretsmanager_secret_version" "s3_bucket_access_secret_version_manage" {
      �[31m-�[0m�[0m arn            = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id             = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa|terraform-20241127111607534800000009" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret_id      = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret_string  = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m version_id     = "terraform-20241127111607534800000009" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m version_stages = [
          �[31m-�[0m�[0m "AWSCURRENT",
        ] �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.s3a_access_point.time_sleep.user_propagation�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "time_sleep" "user_propagation" {
      �[31m-�[0m�[0m create_duration = "20s" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id              = "2024-11-27T11:16:25Z" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m triggers        = {
          �[31m-�[0m�[0m "user_arn" = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3a-user"
        } �[90m-> null�[0m�[0m
    }

�[1m  # module.s3c.aws_s3_bucket.s3_bucket�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket" "s3_bucket" {
      �[31m-�[0m�[0m arn                         = "arn:aws:s3:::fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket                      = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_domain_name          = "fvtsaas-fvtsaas-s3c.s3.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_regional_domain_name = "fvtsaas-fvtsaas-s3c.s3.us-east-2.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_destroy               = true �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m hosted_zone_id              = "Z2O1EMRO9K5GLX" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                          = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m object_lock_enabled         = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                      = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:ListBucket",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:DeleteObject",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3c-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3c/*",
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3c",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m region                      = "us-east-2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m request_payer               = "BucketOwner" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                        = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all                    = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
        �[90m# (2 unchanged attributes hidden)�[0m�[0m

      �[31m-�[0m�[0m grant {
          �[31m-�[0m�[0m id          = "3bbf14d25f8c6dc8258bde5ab36085752d6a49a2f40a4a7578382c0965ab4228" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m permissions = [
              �[31m-�[0m�[0m "FULL_CONTROL",
            ] �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m type        = "CanonicalUser" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }

      �[31m-�[0m�[0m server_side_encryption_configuration {
          �[31m-�[0m�[0m rule {
              �[31m-�[0m�[0m bucket_key_enabled = false �[90m-> null�[0m�[0m

              �[31m-�[0m�[0m apply_server_side_encryption_by_default {
                  �[31m-�[0m�[0m sse_algorithm     = "AES256" �[90m-> null�[0m�[0m
                    �[90m# (1 unchanged attribute hidden)�[0m�[0m
                }
            }
        }

      �[31m-�[0m�[0m versioning {
          �[31m-�[0m�[0m enabled    = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m mfa_delete = false �[90m-> null�[0m�[0m
        }
    }

�[1m  # module.s3c.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_server_side_encryption_configuration" "s3_bucket_enable_encryption" {
      �[31m-�[0m�[0m bucket                = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                    = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[31m-�[0m�[0m rule {
          �[31m-�[0m�[0m bucket_key_enabled = false �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m apply_server_side_encryption_by_default {
              �[31m-�[0m�[0m sse_algorithm     = "AES256" �[90m-> null�[0m�[0m
                �[90m# (1 unchanged attribute hidden)�[0m�[0m
            }
        }
    }

�[1m  # module.s3c.aws_s3_bucket_versioning.s3_bucket_versioning�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_versioning" "s3_bucket_versioning" {
      �[31m-�[0m�[0m bucket                = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                    = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[31m-�[0m�[0m versioning_configuration {
          �[31m-�[0m�[0m status     = "Enabled" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }
    }

�[1m  # module.s3c_access_point.aws_iam_access_key.s3_access_point_user_key�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_access_key" "s3_access_point_user_key" {
      �[31m-�[0m�[0m create_date          = "2024-11-27T11:16:05Z" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                   = "AKIAWKXUCZ552LS3RU47" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret               = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m ses_smtp_password_v4 = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m status               = "Active" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m user                 = "fvtsaas-fvtsaas-s3c-user" �[90m-> null�[0m�[0m
    }

�[1m  # module.s3c_access_point.aws_iam_user.s3_access_point_user�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_user" "s3_access_point_user" {
      �[31m-�[0m�[0m arn                  = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3c-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_destroy        = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                   = "fvtsaas-fvtsaas-s3c-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                 = "fvtsaas-fvtsaas-s3c-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m path                 = "/" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                 = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all             = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m unique_id            = "AIDAWKXUCZ556QE7I6BC7" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.s3c_access_point.aws_iam_user_group_membership.s3_policy_group_membership�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_user_group_membership" "s3_policy_group_membership" {
      �[31m-�[0m�[0m groups = [
          �[31m-�[0m�[0m "MCSP_S3_IAM_Group",
        ] �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id     = "terraform-20241127111605995900000006" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m user   = "fvtsaas-fvtsaas-s3c-user" �[90m-> null�[0m�[0m
    }

�[1m  # module.s3c_access_point.aws_s3_access_point.s3_access_point�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_access_point" "s3_access_point" {
      �[31m-�[0m�[0m account_id               = "435377327995" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m alias                    = "fvtsaas-fvtsaas-s3c-am5gxzfjp7bq5p3n8diijtabz1ps4use2b-s3alias" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m arn                      = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3c-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket                   = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_account_id        = "435377327995" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m domain_name              = "fvtsaas-fvtsaas-s3c-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m endpoints                = {
          �[31m-�[0m�[0m "dualstack"      = "s3-accesspoint.dualstack.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "fips"           = "s3-accesspoint-fips.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "fips_dualstack" = "s3-accesspoint-fips.dualstack.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "ipv4"           = "s3-accesspoint.us-east-2.amazonaws.com"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m has_public_access_policy = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                       = "435377327995:fvtsaas-fvtsaas-s3c-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                     = "fvtsaas-fvtsaas-s3c-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m network_origin           = "Internet" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                   = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:DeleteObject",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:ListBucket",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3c-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3c-access/object/*",
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3c-access",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m

      �[31m-�[0m�[0m public_access_block_configuration {
          �[31m-�[0m�[0m block_public_acls       = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m block_public_policy     = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m ignore_public_acls      = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m restrict_public_buckets = true �[90m-> null�[0m�[0m
        }
    }

�[1m  # module.s3c_access_point.aws_s3_bucket_policy.allow_access_for_user�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_policy" "allow_access_for_user" {
      �[31m-�[0m�[0m bucket = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id     = "fvtsaas-fvtsaas-s3c" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:ListBucket",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:DeleteObject",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3c-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3c/*",
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3c",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
    }

�[1m  # module.s3c_access_point.aws_s3control_access_point_policy.s3_access_point_policy�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3control_access_point_policy" "s3_access_point_policy" {
      �[31m-�[0m�[0m access_point_arn         = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3c-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m has_public_access_policy = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                       = "435377327995:fvtsaas-fvtsaas-s3c-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                   = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:DeleteObject",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:ListBucket",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3c-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3c-access/object/*",
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3c-access",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
    }

�[1m  # module.s3c_access_point.aws_secretsmanager_secret.s3_bucket_access_secret�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_secretsmanager_secret" "s3_bucket_access_secret" {
      �[31m-�[0m�[0m arn                            = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_overwrite_replica_secret = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                             = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                           = "aws-dev/fvtsaas/fvtsaas/cos" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m recovery_window_in_days        = 0 �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                           = {
          �[31m-�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/cos"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all                       = {
          �[31m-�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/cos"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
        �[90m# (4 unchanged attributes hidden)�[0m�[0m
    }

�[1m  # module.s3c_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_cos[0]�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_secretsmanager_secret_version" "s3_bucket_access_secret_version_cos" {
      �[31m-�[0m�[0m arn            = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id             = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2|terraform-20241127111607012000000007" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret_id      = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret_string  = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m version_id     = "terraform-20241127111607012000000007" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m version_stages = [
          �[31m-�[0m�[0m "AWSCURRENT",
        ] �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.s3c_access_point.time_sleep.user_propagation�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "time_sleep" "user_propagation" {
      �[31m-�[0m�[0m create_duration = "20s" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id              = "2024-11-27T11:16:25Z" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m triggers        = {
          �[31m-�[0m�[0m "user_arn" = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3c-user"
        } �[90m-> null�[0m�[0m
    }

�[1m  # module.s3db2.aws_s3_bucket.s3_bucket�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket" "s3_bucket" {
      �[31m-�[0m�[0m arn                         = "arn:aws:s3:::fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket                      = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_domain_name          = "fvtsaas-fvtsaas-s3db2.s3.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_regional_domain_name = "fvtsaas-fvtsaas-s3db2.s3.us-east-2.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_destroy               = true �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m hosted_zone_id              = "Z2O1EMRO9K5GLX" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                          = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m object_lock_enabled         = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                      = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:ListBucket",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:DeleteObject",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3db2-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3db2/*",
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3db2",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m region                      = "us-east-2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m request_payer               = "BucketOwner" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                        = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all                    = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
        �[90m# (2 unchanged attributes hidden)�[0m�[0m

      �[31m-�[0m�[0m grant {
          �[31m-�[0m�[0m id          = "3bbf14d25f8c6dc8258bde5ab36085752d6a49a2f40a4a7578382c0965ab4228" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m permissions = [
              �[31m-�[0m�[0m "FULL_CONTROL",
            ] �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m type        = "CanonicalUser" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }

      �[31m-�[0m�[0m server_side_encryption_configuration {
          �[31m-�[0m�[0m rule {
              �[31m-�[0m�[0m bucket_key_enabled = false �[90m-> null�[0m�[0m

              �[31m-�[0m�[0m apply_server_side_encryption_by_default {
                  �[31m-�[0m�[0m sse_algorithm     = "AES256" �[90m-> null�[0m�[0m
                    �[90m# (1 unchanged attribute hidden)�[0m�[0m
                }
            }
        }

      �[31m-�[0m�[0m versioning {
          �[31m-�[0m�[0m enabled    = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m mfa_delete = false �[90m-> null�[0m�[0m
        }
    }

�[1m  # module.s3db2.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_server_side_encryption_configuration" "s3_bucket_enable_encryption" {
      �[31m-�[0m�[0m bucket                = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                    = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[31m-�[0m�[0m rule {
          �[31m-�[0m�[0m bucket_key_enabled = false �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m apply_server_side_encryption_by_default {
              �[31m-�[0m�[0m sse_algorithm     = "AES256" �[90m-> null�[0m�[0m
                �[90m# (1 unchanged attribute hidden)�[0m�[0m
            }
        }
    }

�[1m  # module.s3db2.aws_s3_bucket_versioning.s3_bucket_versioning�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_versioning" "s3_bucket_versioning" {
      �[31m-�[0m�[0m bucket                = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                    = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[31m-�[0m�[0m versioning_configuration {
          �[31m-�[0m�[0m status     = "Enabled" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }
    }

�[1m  # module.s3db2_access_point.aws_iam_access_key.s3_access_point_user_key�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_access_key" "s3_access_point_user_key" {
      �[31m-�[0m�[0m create_date          = "2024-11-27T13:28:52Z" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                   = "AKIAWKXUCZ55YUPVID6B" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret               = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m ses_smtp_password_v4 = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m status               = "Active" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m user                 = "fvtsaas-fvtsaas-s3db2-user" �[90m-> null�[0m�[0m
    }

�[1m  # module.s3db2_access_point.aws_iam_user.s3_access_point_user�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_user" "s3_access_point_user" {
      �[31m-�[0m�[0m arn                  = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3db2-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_destroy        = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                   = "fvtsaas-fvtsaas-s3db2-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                 = "fvtsaas-fvtsaas-s3db2-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m path                 = "/" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                 = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all             = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m unique_id            = "AIDAWKXUCZ556ROVOBFYD" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.s3db2_access_point.aws_iam_user_group_membership.s3_policy_group_membership�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_user_group_membership" "s3_policy_group_membership" {
      �[31m-�[0m�[0m groups = [
          �[31m-�[0m�[0m "MCSP_S3_IAM_Group",
        ] �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id     = "terraform-20241127132852750700000002" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m user   = "fvtsaas-fvtsaas-s3db2-user" �[90m-> null�[0m�[0m
    }

�[1m  # module.s3db2_access_point.aws_s3_access_point.s3_access_point�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_access_point" "s3_access_point" {
      �[31m-�[0m�[0m account_id               = "435377327995" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m alias                    = "fvtsaas-fvtsaas-s3db-3wbk7a98565szfkm7btniq4wr69whuse2b-s3alias" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m arn                      = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3db2-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket                   = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_account_id        = "435377327995" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m domain_name              = "fvtsaas-fvtsaas-s3db2-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m endpoints                = {
          �[31m-�[0m�[0m "dualstack"      = "s3-accesspoint.dualstack.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "fips"           = "s3-accesspoint-fips.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "fips_dualstack" = "s3-accesspoint-fips.dualstack.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "ipv4"           = "s3-accesspoint.us-east-2.amazonaws.com"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m has_public_access_policy = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                       = "435377327995:fvtsaas-fvtsaas-s3db2-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                     = "fvtsaas-fvtsaas-s3db2-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m network_origin           = "Internet" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                   = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:DeleteObject",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:ListBucket",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3db2-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3db2-access/object/*",
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3db2-access",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m

      �[31m-�[0m�[0m public_access_block_configuration {
          �[31m-�[0m�[0m block_public_acls       = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m block_public_policy     = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m ignore_public_acls      = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m restrict_public_buckets = true �[90m-> null�[0m�[0m
        }
    }

�[1m  # module.s3db2_access_point.aws_s3_bucket_policy.allow_access_for_user�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_policy" "allow_access_for_user" {
      �[31m-�[0m�[0m bucket = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id     = "fvtsaas-fvtsaas-s3db2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:ListBucket",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:DeleteObject",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3db2-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3db2/*",
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3db2",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
    }

�[1m  # module.s3db2_access_point.aws_s3control_access_point_policy.s3_access_point_policy�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3control_access_point_policy" "s3_access_point_policy" {
      �[31m-�[0m�[0m access_point_arn         = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3db2-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m has_public_access_policy = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                       = "435377327995:fvtsaas-fvtsaas-s3db2-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                   = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:DeleteObject",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:ListBucket",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3db2-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3db2-access/object/*",
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3db2-access",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
    }

�[1m  # module.s3db2_access_point.aws_secretsmanager_secret.s3_bucket_access_secret�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_secretsmanager_secret" "s3_bucket_access_secret" {
      �[31m-�[0m�[0m arn                            = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_overwrite_replica_secret = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                             = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                           = "aws-dev/fvtsaas/fvtsaas/db2_backup" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m recovery_window_in_days        = 0 �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                           = {
          �[31m-�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/db2_backup"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all                       = {
          �[31m-�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/db2_backup"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
        �[90m# (4 unchanged attributes hidden)�[0m�[0m
    }

�[1m  # module.s3db2_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_secretsmanager_secret_version" "s3_bucket_access_secret_version_manage" {
      �[31m-�[0m�[0m arn            = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id             = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7|terraform-20241127132853879300000003" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret_id      = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret_string  = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m version_id     = "terraform-20241127132853879300000003" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m version_stages = [
          �[31m-�[0m�[0m "AWSCURRENT",
        ] �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.s3db2_access_point.time_sleep.user_propagation�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "time_sleep" "user_propagation" {
      �[31m-�[0m�[0m create_duration = "20s" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id              = "2024-11-27T13:29:12Z" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m triggers        = {
          �[31m-�[0m�[0m "user_arn" = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3db2-user"
        } �[90m-> null�[0m�[0m
    }

�[1m  # module.s3l.aws_s3_bucket.s3_bucket�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket" "s3_bucket" {
      �[31m-�[0m�[0m arn                         = "arn:aws:s3:::fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket                      = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_domain_name          = "fvtsaas-fvtsaas-s3l.s3.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_regional_domain_name = "fvtsaas-fvtsaas-s3l.s3.us-east-2.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_destroy               = true �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m hosted_zone_id              = "Z2O1EMRO9K5GLX" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                          = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m object_lock_enabled         = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                      = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:ListBucket",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:DeleteObject",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3l-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3l/*",
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3l",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m region                      = "us-east-2" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m request_payer               = "BucketOwner" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                        = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all                    = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
        �[90m# (2 unchanged attributes hidden)�[0m�[0m

      �[31m-�[0m�[0m grant {
          �[31m-�[0m�[0m id          = "3bbf14d25f8c6dc8258bde5ab36085752d6a49a2f40a4a7578382c0965ab4228" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m permissions = [
              �[31m-�[0m�[0m "FULL_CONTROL",
            ] �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m type        = "CanonicalUser" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }

      �[31m-�[0m�[0m server_side_encryption_configuration {
          �[31m-�[0m�[0m rule {
              �[31m-�[0m�[0m bucket_key_enabled = false �[90m-> null�[0m�[0m

              �[31m-�[0m�[0m apply_server_side_encryption_by_default {
                  �[31m-�[0m�[0m sse_algorithm     = "AES256" �[90m-> null�[0m�[0m
                    �[90m# (1 unchanged attribute hidden)�[0m�[0m
                }
            }
        }

      �[31m-�[0m�[0m versioning {
          �[31m-�[0m�[0m enabled    = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m mfa_delete = false �[90m-> null�[0m�[0m
        }
    }

�[1m  # module.s3l.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_server_side_encryption_configuration" "s3_bucket_enable_encryption" {
      �[31m-�[0m�[0m bucket                = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                    = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[31m-�[0m�[0m rule {
          �[31m-�[0m�[0m bucket_key_enabled = false �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m apply_server_side_encryption_by_default {
              �[31m-�[0m�[0m sse_algorithm     = "AES256" �[90m-> null�[0m�[0m
                �[90m# (1 unchanged attribute hidden)�[0m�[0m
            }
        }
    }

�[1m  # module.s3l.aws_s3_bucket_versioning.s3_bucket_versioning�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_versioning" "s3_bucket_versioning" {
      �[31m-�[0m�[0m bucket                = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                    = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[31m-�[0m�[0m versioning_configuration {
          �[31m-�[0m�[0m status     = "Enabled" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }
    }

�[1m  # module.s3l_access_point.aws_iam_access_key.s3_access_point_user_key�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_access_key" "s3_access_point_user_key" {
      �[31m-�[0m�[0m create_date          = "2024-11-27T11:16:05Z" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                   = "AKIAWKXUCZ555YXFKRH3" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret               = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m ses_smtp_password_v4 = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m status               = "Active" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m user                 = "fvtsaas-fvtsaas-s3l-user" �[90m-> null�[0m�[0m
    }

�[1m  # module.s3l_access_point.aws_iam_user.s3_access_point_user�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_user" "s3_access_point_user" {
      �[31m-�[0m�[0m arn                  = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3l-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_destroy        = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                   = "fvtsaas-fvtsaas-s3l-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                 = "fvtsaas-fvtsaas-s3l-user" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m path                 = "/" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                 = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all             = {
          �[31m-�[0m�[0m "Name"        = "aws-dev-s3bucket"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m unique_id            = "AIDAWKXUCZ55SJX7KGXEE" �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.s3l_access_point.aws_iam_user_group_membership.s3_policy_group_membership�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_iam_user_group_membership" "s3_policy_group_membership" {
      �[31m-�[0m�[0m groups = [
          �[31m-�[0m�[0m "MCSP_S3_IAM_Group",
        ] �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id     = "terraform-20241127111605935300000005" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m user   = "fvtsaas-fvtsaas-s3l-user" �[90m-> null�[0m�[0m
    }

�[1m  # module.s3l_access_point.aws_s3_access_point.s3_access_point�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_access_point" "s3_access_point" {
      �[31m-�[0m�[0m account_id               = "435377327995" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m alias                    = "fvtsaas-fvtsaas-s3l-yicyi1he81ykrm5wgxdf1cf3d87owuse2b-s3alias" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m arn                      = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3l-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket                   = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m bucket_account_id        = "435377327995" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m domain_name              = "fvtsaas-fvtsaas-s3l-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m endpoints                = {
          �[31m-�[0m�[0m "dualstack"      = "s3-accesspoint.dualstack.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "fips"           = "s3-accesspoint-fips.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "fips_dualstack" = "s3-accesspoint-fips.dualstack.us-east-2.amazonaws.com"
          �[31m-�[0m�[0m "ipv4"           = "s3-accesspoint.us-east-2.amazonaws.com"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m has_public_access_policy = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                       = "435377327995:fvtsaas-fvtsaas-s3l-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                     = "fvtsaas-fvtsaas-s3l-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m network_origin           = "Internet" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                   = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:DeleteObject",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:ListBucket",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3l-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3l-access/object/*",
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3l-access",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m

      �[31m-�[0m�[0m public_access_block_configuration {
          �[31m-�[0m�[0m block_public_acls       = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m block_public_policy     = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m ignore_public_acls      = true �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m restrict_public_buckets = true �[90m-> null�[0m�[0m
        }
    }

�[1m  # module.s3l_access_point.aws_s3_bucket_policy.allow_access_for_user�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3_bucket_policy" "allow_access_for_user" {
      �[31m-�[0m�[0m bucket = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id     = "fvtsaas-fvtsaas-s3l" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:ListBucket",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:DeleteObject",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3l-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3l/*",
                          �[31m-�[0m�[0m "arn:aws:s3:::fvtsaas-fvtsaas-s3l",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
    }

�[1m  # module.s3l_access_point.aws_s3control_access_point_policy.s3_access_point_policy�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_s3control_access_point_policy" "s3_access_point_policy" {
      �[31m-�[0m�[0m access_point_arn         = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3l-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m has_public_access_policy = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                       = "435377327995:fvtsaas-fvtsaas-s3l-access" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m policy                   = jsonencode(
            {
              �[31m-�[0m�[0m Statement = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m Action    = [
                          �[31m-�[0m�[0m "s3:DeleteObject",
                          �[31m-�[0m�[0m "s3:GetObject",
                          �[31m-�[0m�[0m "s3:GetObjectAcl",
                          �[31m-�[0m�[0m "s3:PutObject",
                          �[31m-�[0m�[0m "s3:PutObjectAcl",
                          �[31m-�[0m�[0m "s3:ListBucket",
                        ]
                      �[31m-�[0m�[0m Effect    = "Allow"
                      �[31m-�[0m�[0m Principal = {
                          �[31m-�[0m�[0m AWS = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3l-user"
                        }
                      �[31m-�[0m�[0m Resource  = [
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3l-access/object/*",
                          �[31m-�[0m�[0m "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3l-access",
                        ]
                    },
                ]
              �[31m-�[0m�[0m Version   = "2012-10-17"
            }
        ) �[90m-> null�[0m�[0m
    }

�[1m  # module.s3l_access_point.aws_secretsmanager_secret.s3_bucket_access_secret�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_secretsmanager_secret" "s3_bucket_access_secret" {
      �[31m-�[0m�[0m arn                            = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m force_overwrite_replica_secret = false �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id                             = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m name                           = "aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m recovery_window_in_days        = 0 �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags                           = {
          �[31m-�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m tags_all                       = {
          �[31m-�[0m�[0m "Name"        = "aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey"
          �[31m-�[0m�[0m "contact"     = "[email protected]"
          �[31m-�[0m�[0m "cost-center" = "12345"
          �[31m-�[0m�[0m "environment" = "dev"
          �[31m-�[0m�[0m "owner"       = "productteam"
          �[31m-�[0m�[0m "source"      = "terraform"
        } �[90m-> null�[0m�[0m
        �[90m# (4 unchanged attributes hidden)�[0m�[0m
    }

�[1m  # module.s3l_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "aws_secretsmanager_secret_version" "s3_bucket_access_secret_version_manage" {
      �[31m-�[0m�[0m arn            = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id             = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6|terraform-20241127111607440200000008" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret_id      = "arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m secret_string  = (sensitive value) �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m version_id     = "terraform-20241127111607440200000008" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m version_stages = [
          �[31m-�[0m�[0m "AWSCURRENT",
        ] �[90m-> null�[0m�[0m
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.s3l_access_point.time_sleep.user_propagation�[0m will be �[1m�[31mdestroyed�[0m
�[0m  �[31m-�[0m�[0m resource "time_sleep" "user_propagation" {
      �[31m-�[0m�[0m create_duration = "20s" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m id              = "2024-11-27T11:16:25Z" �[90m-> null�[0m�[0m
      �[31m-�[0m�[0m triggers        = {
          �[31m-�[0m�[0m "user_arn" = "arn:aws:iam::435377327995:user/fvtsaas-fvtsaas-s3l-user"
        } �[90m-> null�[0m�[0m
    }

�[1mPlan:�[0m 0 to add, 0 to change, 48 to destroy.
�[0m
Changes to Outputs:
  �[31m-�[0m�[0m s3a                = {
      �[31m-�[0m�[0m s3_bucket_arn                         = "arn:aws:s3:::fvtsaas-fvtsaas-s3a"
      �[31m-�[0m�[0m s3_bucket_bucket_domain_name          = "fvtsaas-fvtsaas-s3a.s3.amazonaws.com"
      �[31m-�[0m�[0m s3_bucket_bucket_regional_domain_name = "fvtsaas-fvtsaas-s3a.s3.us-east-2.amazonaws.com"
      �[31m-�[0m�[0m s3_bucket_hosted_zone_id              = "Z2O1EMRO9K5GLX"
      �[31m-�[0m�[0m s3_bucket_id                          = "fvtsaas-fvtsaas-s3a"
      �[31m-�[0m�[0m s3_bucket_region                      = "us-east-2"
    } �[90m-> null�[0m�[0m
  �[31m-�[0m�[0m s3a_access_point   = {
      �[31m-�[0m�[0m s3_access_point_alias  = "fvtsaas-fvtsaas-s3a-5mujyxurko4afuzgqbpk6mf79hyu6use2b-s3alias"
      �[31m-�[0m�[0m s3_access_point_arn    = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3a-access"
      �[31m-�[0m�[0m s3_access_point_domain = "fvtsaas-fvtsaas-s3a-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com"
    } �[90m-> null�[0m�[0m
  �[31m-�[0m�[0m s3c                = {
      �[31m-�[0m�[0m s3_bucket_arn                         = "arn:aws:s3:::fvtsaas-fvtsaas-s3a"
      �[31m-�[0m�[0m s3_bucket_bucket_domain_name          = "fvtsaas-fvtsaas-s3a.s3.amazonaws.com"
      �[31m-�[0m�[0m s3_bucket_bucket_regional_domain_name = "fvtsaas-fvtsaas-s3a.s3.us-east-2.amazonaws.com"
      �[31m-�[0m�[0m s3_bucket_hosted_zone_id              = "Z2O1EMRO9K5GLX"
      �[31m-�[0m�[0m s3_bucket_id                          = "fvtsaas-fvtsaas-s3a"
      �[31m-�[0m�[0m s3_bucket_region                      = "us-east-2"
    } �[90m-> null�[0m�[0m
  �[31m-�[0m�[0m s3c_access_point   = {
      �[31m-�[0m�[0m s3_access_point_alias  = "fvtsaas-fvtsaas-s3c-am5gxzfjp7bq5p3n8diijtabz1ps4use2b-s3alias"
      �[31m-�[0m�[0m s3_access_point_arn    = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3c-access"
      �[31m-�[0m�[0m s3_access_point_domain = "fvtsaas-fvtsaas-s3c-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com"
    } �[90m-> null�[0m�[0m
  �[31m-�[0m�[0m s3db2              = {
      �[31m-�[0m�[0m s3_bucket_arn                         = "arn:aws:s3:::fvtsaas-fvtsaas-s3db2"
      �[31m-�[0m�[0m s3_bucket_bucket_domain_name          = "fvtsaas-fvtsaas-s3db2.s3.amazonaws.com"
      �[31m-�[0m�[0m s3_bucket_bucket_regional_domain_name = "fvtsaas-fvtsaas-s3db2.s3.us-east-2.amazonaws.com"
      �[31m-�[0m�[0m s3_bucket_hosted_zone_id              = "Z2O1EMRO9K5GLX"
      �[31m-�[0m�[0m s3_bucket_id                          = "fvtsaas-fvtsaas-s3db2"
      �[31m-�[0m�[0m s3_bucket_region                      = "us-east-2"
    } �[90m-> null�[0m�[0m
  �[31m-�[0m�[0m s3db2_access_point = {
      �[31m-�[0m�[0m s3_access_point_alias  = "fvtsaas-fvtsaas-s3db-3wbk7a98565szfkm7btniq4wr69whuse2b-s3alias"
      �[31m-�[0m�[0m s3_access_point_arn    = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3db2-access"
      �[31m-�[0m�[0m s3_access_point_domain = "fvtsaas-fvtsaas-s3db2-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com"
    } �[90m-> null�[0m�[0m
  �[31m-�[0m�[0m s3l                = {
      �[31m-�[0m�[0m s3_bucket_arn                         = "arn:aws:s3:::fvtsaas-fvtsaas-s3l"
      �[31m-�[0m�[0m s3_bucket_bucket_domain_name          = "fvtsaas-fvtsaas-s3l.s3.amazonaws.com"
      �[31m-�[0m�[0m s3_bucket_bucket_regional_domain_name = "fvtsaas-fvtsaas-s3l.s3.us-east-2.amazonaws.com"
      �[31m-�[0m�[0m s3_bucket_hosted_zone_id              = "Z2O1EMRO9K5GLX"
      �[31m-�[0m�[0m s3_bucket_id                          = "fvtsaas-fvtsaas-s3l"
      �[31m-�[0m�[0m s3_bucket_region                      = "us-east-2"
    } �[90m-> null�[0m�[0m
  �[31m-�[0m�[0m s3l_access_point   = {
      �[31m-�[0m�[0m s3_access_point_alias  = "fvtsaas-fvtsaas-s3l-yicyi1he81ykrm5wgxdf1cf3d87owuse2b-s3alias"
      �[31m-�[0m�[0m s3_access_point_arn    = "arn:aws:s3:us-east-2:435377327995:accesspoint/fvtsaas-fvtsaas-s3l-access"
      �[31m-�[0m�[0m s3_access_point_domain = "fvtsaas-fvtsaas-s3l-access-435377327995.s3-accesspoint.us-east-2.amazonaws.com"
    } �[90m-> null�[0m�[0m
�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Saved the plan to: tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "tfplan"
/tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision/terraform -chdir=/tmp/init-cos/gitops-envs/fvtsaas/tmp-cos-deprovision apply -auto-approve -input=false tfplan
�[0m�[1mmodule.s3l_access_point.aws_s3_bucket_policy.allow_access_for_user: Destroying... [id=fvtsaas-fvtsaas-s3l]�[0m�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_versioning.s3_bucket_versioning: Destroying... [id=fvtsaas-fvtsaas-s3db2]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3_bucket_policy.allow_access_for_user: Destroying... [id=fvtsaas-fvtsaas-s3a]�[0m�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket_versioning.s3_bucket_versioning: Destroying... [id=fvtsaas-fvtsaas-s3l]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3_bucket_policy.allow_access_for_user: Destroying... [id=fvtsaas-fvtsaas-s3c]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Destroying... [id=435377327995:fvtsaas-fvtsaas-s3db2-access]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Destroying... [id=435377327995:fvtsaas-fvtsaas-s3c-access]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Destroying... [id=435377327995:fvtsaas-fvtsaas-s3a-access]�[0m�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket_versioning.s3_bucket_versioning: Destroying... [id=fvtsaas-fvtsaas-s3a]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Destroying... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7|terraform-20241127132853879300000003]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_cos[0]: Destroying... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2|terraform-20241127111607012000000007]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_cos[0]: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Destroying... [id=terraform-20241127111605995900000006]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Destroying... [id=fvtsaas-fvtsaas-s3c]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Destroying... [id=435377327995:fvtsaas-fvtsaas-s3l-access]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Destroying... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa|terraform-20241127111607534800000009]�[0m�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_versioning.s3_bucket_versioning: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3_bucket_policy.allow_access_for_user: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_bucket_policy.allow_access_for_user: Destroying... [id=fvtsaas-fvtsaas-s3db2]�[0m�[0m
�[0m�[1mmodule.s3l_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Destroying... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6|terraform-20241127111607440200000008]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3_bucket_policy.allow_access_for_user: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket_versioning.s3_bucket_versioning: Destroying... [id=fvtsaas-fvtsaas-s3c]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3_bucket_policy.allow_access_for_user: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Destroying... [id=terraform-20241127111605865400000004]�[0m�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Destroying... [id=fvtsaas-fvtsaas-s3a]�[0m�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3control_access_point_policy.s3_access_point_policy: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Destroying... [id=terraform-20241127111605935300000005]�[0m�[0m
�[0m�[1mmodule.s3l_access_point.aws_secretsmanager_secret_version.s3_bucket_access_secret_version_manage[0]: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Destroying... [id=fvtsaas-fvtsaas-s3db2]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Destroying... [id=terraform-20241127132852750700000002]�[0m�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket_versioning.s3_bucket_versioning: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Destroying... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/db2_backup-KSPnC7]�[0m�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Destroying... [id=fvtsaas-fvtsaas-s3l]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_access_key.s3_access_point_user_key: Destroying... [id=AKIAWKXUCZ55YUPVID6B]�[0m�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_bucket_policy.allow_access_for_user: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Destroying... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/cos-NbAYx2]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_access_key.s3_access_point_user_key: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket_versioning.s3_bucket_versioning: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user_group_membership.s3_policy_group_membership: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_access_key.s3_access_point_user_key: Destroying... [id=AKIAWKXUCZ552LS3RU47]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3_access_point.s3_access_point: Destroying... [id=435377327995:fvtsaas-fvtsaas-s3a-access]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_access_point.s3_access_point: Destroying... [id=435377327995:fvtsaas-fvtsaas-s3db2-access]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3_access_point.s3_access_point: Destroying... [id=435377327995:fvtsaas-fvtsaas-s3c-access]�[0m�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket_versioning.s3_bucket_versioning: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c_access_point.time_sleep.user_propagation: Destroying... [id=2024-11-27T11:16:25Z]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.time_sleep.user_propagation: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3a_access_point.time_sleep.user_propagation: Destroying... [id=2024-11-27T11:16:25Z]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.time_sleep.user_propagation: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Destruction complete after 1s�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_access_key.s3_access_point_user_key: Destroying... [id=AKIAWKXUCZ55VOSRFJMT]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_s3_access_point.s3_access_point: Destruction complete after 1s�[0m
�[0m�[1mmodule.s3a_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Destroying... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_attachments/cosawssecret-oskmCa]�[0m�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3_access_point.s3_access_point: Destroying... [id=435377327995:fvtsaas-fvtsaas-s3l-access]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_s3_access_point.s3_access_point: Destruction complete after 1s�[0m
�[0m�[1mmodule.s3l_access_point.time_sleep.user_propagation: Destroying... [id=2024-11-27T11:16:25Z]�[0m�[0m
�[0m�[1mmodule.s3l_access_point.time_sleep.user_propagation: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_s3_access_point.s3_access_point: Destruction complete after 1s�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_access_key.s3_access_point_user_key: Destroying... [id=AKIAWKXUCZ555YXFKRH3]�[0m�[0m
�[0m�[1mmodule.s3l_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Destroying... [id=arn:aws:secretsmanager:us-east-2:435377327995:secret:aws-dev/fvtsaas/fvtsaas/manage_logging/s3secretkey-0jsxi6]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_access_key.s3_access_point_user_key: Destruction complete after 1s�[0m
�[0m�[1mmodule.s3db2_access_point.time_sleep.user_propagation: Destroying... [id=2024-11-27T13:29:12Z]�[0m�[0m
�[0m�[1mmodule.s3db2_access_point.time_sleep.user_propagation: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket.s3_bucket: Destroying... [id=fvtsaas-fvtsaas-s3c]�[0m�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Destruction complete after 1s�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Destruction complete after 1s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user.s3_access_point_user: Destroying... [id=fvtsaas-fvtsaas-s3db2-user]�[0m�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_user.s3_access_point_user: Destroying... [id=fvtsaas-fvtsaas-s3c-user]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_access_key.s3_access_point_user_key: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3l_access_point.aws_s3_access_point.s3_access_point: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket.s3_bucket: Destroying... [id=fvtsaas-fvtsaas-s3db2]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_user.s3_access_point_user: Destroying... [id=fvtsaas-fvtsaas-s3a-user]�[0m�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket_server_side_encryption_configuration.s3_bucket_enable_encryption[0]: Destruction complete after 1s�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_access_key.s3_access_point_user_key: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket.s3_bucket: Destroying... [id=fvtsaas-fvtsaas-s3l]�[0m�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket.s3_bucket: Destroying... [id=fvtsaas-fvtsaas-s3a]�[0m�[0m
�[0m�[1mmodule.s3a_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_user.s3_access_point_user: Destroying... [id=fvtsaas-fvtsaas-s3l-user]�[0m�[0m
�[0m�[1mmodule.s3l_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c_access_point.aws_iam_user.s3_access_point_user: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2_access_point.aws_iam_user.s3_access_point_user: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c.aws_s3_bucket.s3_bucket: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3a_access_point.aws_iam_user.s3_access_point_user: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3l_access_point.aws_iam_user.s3_access_point_user: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3l.aws_s3_bucket.s3_bucket: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3db2.aws_s3_bucket.s3_bucket: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3a.aws_s3_bucket.s3_bucket: Destruction complete after 0s�[0m
�[0m�[1mmodule.s3c_access_point.aws_secretsmanager_secret.s3_bucket_access_secret: Destruction complete after 1s�[0m
�[0m�[1m�[32m
Apply complete! Resources: 0 added, 0 changed, 48 destroyed.
�[0m

@whitfiea whitfiea self-requested a review December 4, 2024 11:18
@whitfiea whitfiea changed the title [patch] Setup Db2 Backup job for Disaster recovery scenario and Compliance/SLA [patch] Setup Db2 Backup job for Disaster recovery scenario and Compliance/SLA in gitops Dec 4, 2024
@whitfiea whitfiea changed the title [patch] Setup Db2 Backup job for Disaster recovery scenario and Compliance/SLA in gitops [minor] Setup Db2 Backup job for Disaster recovery scenario and Compliance/SLA in gitops Dec 4, 2024
@whitfiea whitfiea merged commit e56ff14 into master Dec 4, 2024
9 checks passed
@whitfiea whitfiea deleted the db2-backup-and-compliance branch December 4, 2024 12:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants