matt@matt-precision-ubuntu:~/git/upbound-provider-aws$ make uptest UPTEST_EXAMPLE_LIST="examples/ssoadmin/v1beta2/customermanagedpolicyattachment.yaml,examples/ssoadmin/v1beta2/permissionsboundaryattachment.yaml" 18:01:56 [ .. ] running automated tests Running kuttl tests at /tmp/uptest-e2e 2024/06/09 18:01:56 running without a 'kuttl-test.yaml' configuration 2024/06/09 18:01:56 kutt-test config testdirs is overridden with args: [ /tmp/uptest-e2e ] === RUN kuttl harness.go:460: starting setup harness.go:251: running tests using configured kubeconfig. harness.go:288: Successful connection to cluster at: https://127.0.0.1:35951 harness.go:356: running tests harness.go:74: going to run test suite with timeout of 1200 seconds for each step harness.go:368: testsuite: /tmp/uptest-e2e has 1 tests === RUN kuttl/harness === RUN kuttl/harness/case === PAUSE kuttl/harness/case === CONT kuttl/harness/case logger.go:42: 18:01:57 | case | Creating namespace: kuttl-test-hot-moray logger.go:42: 18:01:57 | case/0-apply | starting test step 0-apply logger.go:42: 18:01:57 | case/0-apply | running command: [/home/matt/git/upbound-provider-aws/cluster/test/setup.sh] logger.go:42: 18:01:57 | case/0-apply | Running setup.sh logger.go:42: 18:01:57 | case/0-apply | Creating the default cloud credentials secret... logger.go:42: 18:01:57 | case/0-apply | secret/provider-secret configured logger.go:42: 18:01:57 | case/0-apply | Creating a default provider config... logger.go:42: 18:01:57 | case/0-apply | providerconfig.aws.upbound.io/default unchanged logger.go:42: 18:01:58 | case/0-apply | CustomerManagedPolicyAttachment:/ssoadmin-customer-managed-policy-attachment created logger.go:42: 18:01:58 | case/0-apply | Policy:/ssoadmin-customer-managed-policy-attachment created logger.go:42: 18:01:58 | case/0-apply | PermissionSet:/ssoadmin-customer-managed-policy-attachment created logger.go:42: 18:01:58 | case/0-apply | PermissionsBoundaryAttachment:/ssoadmin-permissions-boundary-attachment created logger.go:42: 18:01:58 | case/0-apply | Policy:/ssoadmin-permissions-boundary-attachment created logger.go:42: 18:01:58 | case/0-apply | PermissionSet:/ssoadmin-permissions-boundary-attachment created logger.go:42: 18:01:58 | case/0-apply | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 annotate managed --all upjet.upbound.io/test=true --overwrite] logger.go:42: 18:01:58 | case/0-apply | policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:01:58 | case/0-apply | policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:01:58 | case/0-apply | customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:01:58 | case/0-apply | permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:01:58 | case/0-apply | permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:01:58 | case/0-apply | permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:01:58 | case/0-apply | running command: [sh -c echo "Dump MR manifests for the apply assertion step:"; ${KUBECTL} get managed -o yaml] logger.go:42: 18:01:58 | case/0-apply | Dump MR manifests for the apply assertion step: logger.go:42: 18:01:58 | case/0-apply | apiVersion: v1 logger.go:42: 18:01:58 | case/0-apply | items: logger.go:42: 18:01:58 | case/0-apply | - apiVersion: iam.aws.upbound.io/v1beta1 logger.go:42: 18:01:58 | case/0-apply | kind: Policy logger.go:42: 18:01:58 | case/0-apply | metadata: logger.go:42: 18:01:58 | case/0-apply | annotations: logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-create-pending: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-create-succeeded: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment logger.go:42: 18:01:58 | case/0-apply | upjet.upbound.io/test: "true" logger.go:42: 18:01:58 | case/0-apply | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | finalizers: logger.go:42: 18:01:58 | case/0-apply | - finalizer.managedresource.crossplane.io logger.go:42: 18:01:58 | case/0-apply | generation: 2 logger.go:42: 18:01:58 | case/0-apply | labels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | resourceVersion: "2992" logger.go:42: 18:01:58 | case/0-apply | uid: 8271d30d-1437-47d5-80e7-c9e81a9b7702 logger.go:42: 18:01:58 | case/0-apply | spec: logger.go:42: 18:01:58 | case/0-apply | deletionPolicy: Delete logger.go:42: 18:01:58 | case/0-apply | forProvider: logger.go:42: 18:01:58 | case/0-apply | description: My test policy logger.go:42: 18:01:58 | case/0-apply | policy: | logger.go:42: 18:01:58 | case/0-apply | { logger.go:42: 18:01:58 | case/0-apply | "Version": "2012-10-17", logger.go:42: 18:01:58 | case/0-apply | "Statement": [ logger.go:42: 18:01:58 | case/0-apply | { logger.go:42: 18:01:58 | case/0-apply | "Effect": "Allow", logger.go:42: 18:01:58 | case/0-apply | "Action": "ec2:Describe*", logger.go:42: 18:01:58 | case/0-apply | "Resource": "*" logger.go:42: 18:01:58 | case/0-apply | } logger.go:42: 18:01:58 | case/0-apply | ] logger.go:42: 18:01:58 | case/0-apply | } logger.go:42: 18:01:58 | case/0-apply | tags: logger.go:42: 18:01:58 | case/0-apply | crossplane-kind: policy.iam.aws.upbound.io logger.go:42: 18:01:58 | case/0-apply | crossplane-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | crossplane-providerconfig: default logger.go:42: 18:01:58 | case/0-apply | initProvider: {} logger.go:42: 18:01:58 | case/0-apply | managementPolicies: logger.go:42: 18:01:58 | case/0-apply | - '*' logger.go:42: 18:01:58 | case/0-apply | providerConfigRef: logger.go:42: 18:01:58 | case/0-apply | name: default logger.go:42: 18:01:58 | case/0-apply | status: logger.go:42: 18:01:58 | case/0-apply | atProvider: {} logger.go:42: 18:01:58 | case/0-apply | conditions: logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | reason: Creating logger.go:42: 18:01:58 | case/0-apply | status: "False" logger.go:42: 18:01:58 | case/0-apply | type: Ready logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | reason: ReconcileSuccess logger.go:42: 18:01:58 | case/0-apply | status: "True" logger.go:42: 18:01:58 | case/0-apply | type: Synced logger.go:42: 18:01:58 | case/0-apply | - apiVersion: iam.aws.upbound.io/v1beta1 logger.go:42: 18:01:58 | case/0-apply | kind: Policy logger.go:42: 18:01:58 | case/0-apply | metadata: logger.go:42: 18:01:58 | case/0-apply | annotations: logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-create-pending: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-create-succeeded: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment logger.go:42: 18:01:58 | case/0-apply | upjet.upbound.io/test: "true" logger.go:42: 18:01:58 | case/0-apply | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | finalizers: logger.go:42: 18:01:58 | case/0-apply | - finalizer.managedresource.crossplane.io logger.go:42: 18:01:58 | case/0-apply | generation: 2 logger.go:42: 18:01:58 | case/0-apply | labels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | resourceVersion: "2995" logger.go:42: 18:01:58 | case/0-apply | uid: 03ec511b-e1ac-4dc3-9dd3-a58ecc6775cf logger.go:42: 18:01:58 | case/0-apply | spec: logger.go:42: 18:01:58 | case/0-apply | deletionPolicy: Delete logger.go:42: 18:01:58 | case/0-apply | forProvider: logger.go:42: 18:01:58 | case/0-apply | description: My test policy logger.go:42: 18:01:58 | case/0-apply | policy: | logger.go:42: 18:01:58 | case/0-apply | { logger.go:42: 18:01:58 | case/0-apply | "Version": "2012-10-17", logger.go:42: 18:01:58 | case/0-apply | "Statement": [ logger.go:42: 18:01:58 | case/0-apply | { logger.go:42: 18:01:58 | case/0-apply | "Effect": "Allow", logger.go:42: 18:01:58 | case/0-apply | "Action": "ec2:Describe*", logger.go:42: 18:01:58 | case/0-apply | "Resource": "*" logger.go:42: 18:01:58 | case/0-apply | } logger.go:42: 18:01:58 | case/0-apply | ] logger.go:42: 18:01:58 | case/0-apply | } logger.go:42: 18:01:58 | case/0-apply | tags: logger.go:42: 18:01:58 | case/0-apply | crossplane-kind: policy.iam.aws.upbound.io logger.go:42: 18:01:58 | case/0-apply | crossplane-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | crossplane-providerconfig: default logger.go:42: 18:01:58 | case/0-apply | initProvider: {} logger.go:42: 18:01:58 | case/0-apply | managementPolicies: logger.go:42: 18:01:58 | case/0-apply | - '*' logger.go:42: 18:01:58 | case/0-apply | providerConfigRef: logger.go:42: 18:01:58 | case/0-apply | name: default logger.go:42: 18:01:58 | case/0-apply | status: logger.go:42: 18:01:58 | case/0-apply | atProvider: {} logger.go:42: 18:01:58 | case/0-apply | conditions: logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | reason: Creating logger.go:42: 18:01:58 | case/0-apply | status: "False" logger.go:42: 18:01:58 | case/0-apply | type: Ready logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | reason: ReconcileSuccess logger.go:42: 18:01:58 | case/0-apply | status: "True" logger.go:42: 18:01:58 | case/0-apply | type: Synced logger.go:42: 18:01:58 | case/0-apply | - apiVersion: ssoadmin.aws.upbound.io/v1beta2 logger.go:42: 18:01:58 | case/0-apply | kind: CustomerManagedPolicyAttachment logger.go:42: 18:01:58 | case/0-apply | metadata: logger.go:42: 18:01:58 | case/0-apply | annotations: logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment logger.go:42: 18:01:58 | case/0-apply | Amazon Resource Name (ARN) of the SSO Instance under which the operation will logger.go:42: 18:01:58 | case/0-apply | be executed). logger.go:42: 18:01:58 | case/0-apply | upjet.upbound.io/test: "true" logger.go:42: 18:01:58 | case/0-apply | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | generation: 1 logger.go:42: 18:01:58 | case/0-apply | labels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | resourceVersion: "2979" logger.go:42: 18:01:58 | case/0-apply | uid: 9fabc30a-a22c-46df-92e2-f502985802a7 logger.go:42: 18:01:58 | case/0-apply | spec: logger.go:42: 18:01:58 | case/0-apply | deletionPolicy: Delete logger.go:42: 18:01:58 | case/0-apply | forProvider: logger.go:42: 18:01:58 | case/0-apply | customerManagedPolicyReference: logger.go:42: 18:01:58 | case/0-apply | path: / logger.go:42: 18:01:58 | case/0-apply | policyNameSelector: logger.go:42: 18:01:58 | case/0-apply | matchLabels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:01:58 | case/0-apply | permissionSetArnSelector: logger.go:42: 18:01:58 | case/0-apply | matchLabels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | region: us-east-1 logger.go:42: 18:01:58 | case/0-apply | initProvider: {} logger.go:42: 18:01:58 | case/0-apply | managementPolicies: logger.go:42: 18:01:58 | case/0-apply | - '*' logger.go:42: 18:01:58 | case/0-apply | providerConfigRef: logger.go:42: 18:01:58 | case/0-apply | name: default logger.go:42: 18:01:58 | case/0-apply | status: logger.go:42: 18:01:58 | case/0-apply | atProvider: {} logger.go:42: 18:01:58 | case/0-apply | conditions: logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | message: 'cannot resolve references: mg.Spec.ForProvider.PermissionSetArn: referenced logger.go:42: 18:01:58 | case/0-apply | field was empty (referenced resource may not yet be ready)' logger.go:42: 18:01:58 | case/0-apply | reason: ReconcileError logger.go:42: 18:01:58 | case/0-apply | status: "False" logger.go:42: 18:01:58 | case/0-apply | type: Synced logger.go:42: 18:01:58 | case/0-apply | - apiVersion: ssoadmin.aws.upbound.io/v1beta2 logger.go:42: 18:01:58 | case/0-apply | kind: PermissionsBoundaryAttachment logger.go:42: 18:01:58 | case/0-apply | metadata: logger.go:42: 18:01:58 | case/0-apply | annotations: logger.go:42: 18:01:58 | case/0-apply | meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment logger.go:42: 18:01:58 | case/0-apply | upjet.upbound.io/test: "true" logger.go:42: 18:01:58 | case/0-apply | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | generation: 1 logger.go:42: 18:01:58 | case/0-apply | labels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | resourceVersion: "2983" logger.go:42: 18:01:58 | case/0-apply | uid: 90c49a30-18bd-481d-94e5-dd5d5ad63e66 logger.go:42: 18:01:58 | case/0-apply | spec: logger.go:42: 18:01:58 | case/0-apply | deletionPolicy: Delete logger.go:42: 18:01:58 | case/0-apply | forProvider: logger.go:42: 18:01:58 | case/0-apply | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:01:58 | case/0-apply | permissionSetArnSelector: logger.go:42: 18:01:58 | case/0-apply | matchLabels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | permissionsBoundary: logger.go:42: 18:01:58 | case/0-apply | customerManagedPolicyReference: logger.go:42: 18:01:58 | case/0-apply | nameSelector: logger.go:42: 18:01:58 | case/0-apply | matchLabels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | path: / logger.go:42: 18:01:58 | case/0-apply | region: us-east-1 logger.go:42: 18:01:58 | case/0-apply | initProvider: {} logger.go:42: 18:01:58 | case/0-apply | managementPolicies: logger.go:42: 18:01:58 | case/0-apply | - '*' logger.go:42: 18:01:58 | case/0-apply | providerConfigRef: logger.go:42: 18:01:58 | case/0-apply | name: default logger.go:42: 18:01:58 | case/0-apply | status: logger.go:42: 18:01:58 | case/0-apply | atProvider: {} logger.go:42: 18:01:58 | case/0-apply | conditions: logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | message: 'cannot resolve references: mg.Spec.ForProvider.PermissionSetArn: referenced logger.go:42: 18:01:58 | case/0-apply | field was empty (referenced resource may not yet be ready)' logger.go:42: 18:01:58 | case/0-apply | reason: ReconcileError logger.go:42: 18:01:58 | case/0-apply | status: "False" logger.go:42: 18:01:58 | case/0-apply | type: Synced logger.go:42: 18:01:58 | case/0-apply | - apiVersion: ssoadmin.aws.upbound.io/v1beta1 logger.go:42: 18:01:58 | case/0-apply | kind: PermissionSet logger.go:42: 18:01:58 | case/0-apply | metadata: logger.go:42: 18:01:58 | case/0-apply | annotations: logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-create-pending: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-create-succeeded: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment logger.go:42: 18:01:58 | case/0-apply | upjet.upbound.io/test: "true" logger.go:42: 18:01:58 | case/0-apply | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | finalizers: logger.go:42: 18:01:58 | case/0-apply | - finalizer.managedresource.crossplane.io logger.go:42: 18:01:58 | case/0-apply | generation: 2 logger.go:42: 18:01:58 | case/0-apply | labels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | resourceVersion: "2984" logger.go:42: 18:01:58 | case/0-apply | uid: 738346c2-8f02-43c9-b61b-9ec179566301 logger.go:42: 18:01:58 | case/0-apply | spec: logger.go:42: 18:01:58 | case/0-apply | deletionPolicy: Delete logger.go:42: 18:01:58 | case/0-apply | forProvider: logger.go:42: 18:01:58 | case/0-apply | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:01:58 | case/0-apply | name: example-cmpa logger.go:42: 18:01:58 | case/0-apply | region: us-east-1 logger.go:42: 18:01:58 | case/0-apply | tags: logger.go:42: 18:01:58 | case/0-apply | crossplane-kind: permissionset.ssoadmin.aws.upbound.io logger.go:42: 18:01:58 | case/0-apply | crossplane-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:01:58 | case/0-apply | crossplane-providerconfig: default logger.go:42: 18:01:58 | case/0-apply | initProvider: {} logger.go:42: 18:01:58 | case/0-apply | managementPolicies: logger.go:42: 18:01:58 | case/0-apply | - '*' logger.go:42: 18:01:58 | case/0-apply | providerConfigRef: logger.go:42: 18:01:58 | case/0-apply | name: default logger.go:42: 18:01:58 | case/0-apply | status: logger.go:42: 18:01:58 | case/0-apply | atProvider: {} logger.go:42: 18:01:58 | case/0-apply | conditions: logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | reason: Creating logger.go:42: 18:01:58 | case/0-apply | status: "False" logger.go:42: 18:01:58 | case/0-apply | type: Ready logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | reason: ReconcileSuccess logger.go:42: 18:01:58 | case/0-apply | status: "True" logger.go:42: 18:01:58 | case/0-apply | type: Synced logger.go:42: 18:01:58 | case/0-apply | - apiVersion: ssoadmin.aws.upbound.io/v1beta1 logger.go:42: 18:01:58 | case/0-apply | kind: PermissionSet logger.go:42: 18:01:58 | case/0-apply | metadata: logger.go:42: 18:01:58 | case/0-apply | annotations: logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-create-pending: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | crossplane.io/external-create-succeeded: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment logger.go:42: 18:01:58 | case/0-apply | upjet.upbound.io/test: "true" logger.go:42: 18:01:58 | case/0-apply | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | finalizers: logger.go:42: 18:01:58 | case/0-apply | - finalizer.managedresource.crossplane.io logger.go:42: 18:01:58 | case/0-apply | generation: 2 logger.go:42: 18:01:58 | case/0-apply | labels: logger.go:42: 18:01:58 | case/0-apply | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | resourceVersion: "2985" logger.go:42: 18:01:58 | case/0-apply | uid: 48ade53f-717b-4971-b87c-687a6c23aab5 logger.go:42: 18:01:58 | case/0-apply | spec: logger.go:42: 18:01:58 | case/0-apply | deletionPolicy: Delete logger.go:42: 18:01:58 | case/0-apply | forProvider: logger.go:42: 18:01:58 | case/0-apply | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:01:58 | case/0-apply | name: example-pba logger.go:42: 18:01:58 | case/0-apply | region: us-east-1 logger.go:42: 18:01:58 | case/0-apply | tags: logger.go:42: 18:01:58 | case/0-apply | crossplane-kind: permissionset.ssoadmin.aws.upbound.io logger.go:42: 18:01:58 | case/0-apply | crossplane-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:01:58 | case/0-apply | crossplane-providerconfig: default logger.go:42: 18:01:58 | case/0-apply | initProvider: {} logger.go:42: 18:01:58 | case/0-apply | managementPolicies: logger.go:42: 18:01:58 | case/0-apply | - '*' logger.go:42: 18:01:58 | case/0-apply | providerConfigRef: logger.go:42: 18:01:58 | case/0-apply | name: default logger.go:42: 18:01:58 | case/0-apply | status: logger.go:42: 18:01:58 | case/0-apply | atProvider: {} logger.go:42: 18:01:58 | case/0-apply | conditions: logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | reason: Creating logger.go:42: 18:01:58 | case/0-apply | status: "False" logger.go:42: 18:01:58 | case/0-apply | type: Ready logger.go:42: 18:01:58 | case/0-apply | - lastTransitionTime: "2024-06-10T01:01:58Z" logger.go:42: 18:01:58 | case/0-apply | reason: ReconcileSuccess logger.go:42: 18:01:58 | case/0-apply | status: "True" logger.go:42: 18:01:58 | case/0-apply | type: Synced logger.go:42: 18:01:58 | case/0-apply | kind: List logger.go:42: 18:01:58 | case/0-apply | metadata: logger.go:42: 18:01:58 | case/0-apply | resourceVersion: "" logger.go:42: 18:01:58 | case/0-apply | running command: [sh -c echo "Dump Claim manifests for the apply assertion step:" || ${KUBECTL} get claim --all-namespaces -o yaml] logger.go:42: 18:01:58 | case/0-apply | Dump Claim manifests for the apply assertion step: logger.go:42: 18:01:58 | case/0-apply | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:06 | case/0-apply | customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment condition met logger.go:42: 18:02:06 | case/0-apply | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:07 | case/0-apply | policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment condition met logger.go:42: 18:02:07 | case/0-apply | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:07 | case/0-apply | permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment condition met logger.go:42: 18:02:07 | case/0-apply | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:12 | case/0-apply | permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment condition met logger.go:42: 18:02:12 | case/0-apply | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:12 | case/0-apply | policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment condition met logger.go:42: 18:02:12 | case/0-apply | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:12 | case/0-apply | permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment condition met logger.go:42: 18:02:12 | case/0-apply | test step completed 0-apply logger.go:42: 18:02:12 | case/2-import | starting test step 2-import logger.go:42: 18:02:12 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 annotate managed --all crossplane.io/paused=true --overwrite] logger.go:42: 18:02:12 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:12 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:12 | case/2-import | customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:12 | case/2-import | permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:12 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:12 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:12 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 scale deployment crossplane -n upbound-system --replicas=0 --timeout 10s] logger.go:42: 18:02:13 | case/2-import | deployment.apps/crossplane scaled logger.go:42: 18:02:13 | case/2-import | running command: [sh -c ${KUBECTL} -n ${CROSSPLANE_NAMESPACE} get deploy --no-headers -o custom-columns=":metadata.name" | grep "provider-" | xargs ${KUBECTL} -n ${CROSSPLANE_NAMESPACE} scale deploy --replicas=0] logger.go:42: 18:02:13 | case/2-import | deployment.apps/provider-aws-config-provider-aws scaled logger.go:42: 18:02:13 | case/2-import | deployment.apps/provider-aws-iam-provider-aws scaled logger.go:42: 18:02:13 | case/2-import | deployment.apps/provider-aws-identitystore-provider-aws scaled logger.go:42: 18:02:13 | case/2-import | deployment.apps/provider-aws-ssoadmin-provider-aws scaled logger.go:42: 18:02:13 | case/2-import | running command: [sleep 10] logger.go:42: 18:02:23 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 scale deployment crossplane -n upbound-system --replicas=1 --timeout 10s] logger.go:42: 18:02:24 | case/2-import | deployment.apps/crossplane scaled logger.go:42: 18:02:24 | case/2-import | running command: [sh -c ${KUBECTL} -n ${CROSSPLANE_NAMESPACE} get deploy --no-headers -o custom-columns=":metadata.name" | grep "provider-" | xargs ${KUBECTL} -n ${CROSSPLANE_NAMESPACE} scale deploy --replicas=1] logger.go:42: 18:02:24 | case/2-import | deployment.apps/provider-aws-config-provider-aws scaled logger.go:42: 18:02:24 | case/2-import | deployment.apps/provider-aws-iam-provider-aws scaled logger.go:42: 18:02:24 | case/2-import | deployment.apps/provider-aws-identitystore-provider-aws scaled logger.go:42: 18:02:24 | case/2-import | deployment.apps/provider-aws-ssoadmin-provider-aws scaled logger.go:42: 18:02:24 | case/2-import | running command: [sh -c curl -sL https://raw.githubusercontent.com/crossplane/uptest/main/hack/check_endpoints.sh -o /tmp/check_endpoints.sh && chmod +x /tmp/check_endpoints.sh] logger.go:42: 18:02:24 | case/2-import | running command: [sh -c curl -sL https://raw.githubusercontent.com/crossplane/uptest/main/hack/patch.sh -o /tmp/patch.sh && chmod +x /tmp/patch.sh] logger.go:42: 18:02:25 | case/2-import | running command: [sh -c /tmp/check_endpoints.sh] logger.go:42: 18:02:25 | case/2-import | provider-aws-config - No served ports logger.go:42: 18:02:25 | case/2-import | Retrying... (1/10) logger.go:42: 18:02:30 | case/2-import | provider-aws-config - Ports present logger.go:42: 18:02:30 | case/2-import | provider-aws-iam - Ports present logger.go:42: 18:02:30 | case/2-import | provider-aws-identitystore - Ports present logger.go:42: 18:02:30 | case/2-import | provider-aws-ssoadmin - Ports present logger.go:42: 18:02:30 | case/2-import | running command: [sh -c /tmp/patch.sh customermanagedpolicyattachment.ssoadmin.aws.upbound.io ssoadmin-customer-managed-policy-attachment] logger.go:42: 18:02:30 | case/2-import | customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment patched logger.go:42: 18:02:30 | case/2-import | Successfully patched customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:30 | case/2-import | customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:30 | case/2-import | running command: [sh -c /tmp/patch.sh policy.iam.aws.upbound.io ssoadmin-customer-managed-policy-attachment] logger.go:42: 18:02:30 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment patched logger.go:42: 18:02:30 | case/2-import | Successfully patched policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:30 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:30 | case/2-import | running command: [sh -c /tmp/patch.sh permissionset.ssoadmin.aws.upbound.io ssoadmin-customer-managed-policy-attachment] logger.go:42: 18:02:30 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment patched logger.go:42: 18:02:30 | case/2-import | Successfully patched permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:31 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:31 | case/2-import | running command: [sh -c /tmp/patch.sh permissionsboundaryattachment.ssoadmin.aws.upbound.io ssoadmin-permissions-boundary-attachment] logger.go:42: 18:02:31 | case/2-import | permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment patched logger.go:42: 18:02:31 | case/2-import | Successfully patched permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:31 | case/2-import | permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:31 | case/2-import | running command: [sh -c /tmp/patch.sh policy.iam.aws.upbound.io ssoadmin-permissions-boundary-attachment] logger.go:42: 18:02:31 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment patched logger.go:42: 18:02:31 | case/2-import | Successfully patched policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:31 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:31 | case/2-import | running command: [sh -c /tmp/patch.sh permissionset.ssoadmin.aws.upbound.io ssoadmin-permissions-boundary-attachment] logger.go:42: 18:02:31 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment patched logger.go:42: 18:02:31 | case/2-import | Successfully patched permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:32 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 annotate managed --all crossplane.io/paused=false --overwrite] logger.go:42: 18:02:32 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:32 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:32 | case/2-import | customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:32 | case/2-import | permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:32 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment annotated logger.go:42: 18:02:32 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment annotated logger.go:42: 18:02:32 | case/2-import | running command: [sh -c echo "Dump MR manifests for the import assertion step:"; ${KUBECTL} get managed -o yaml] logger.go:42: 18:02:32 | case/2-import | Dump MR manifests for the import assertion step: logger.go:42: 18:02:32 | case/2-import | apiVersion: v1 logger.go:42: 18:02:32 | case/2-import | items: logger.go:42: 18:02:32 | case/2-import | - apiVersion: iam.aws.upbound.io/v1beta1 logger.go:42: 18:02:32 | case/2-import | kind: Policy logger.go:42: 18:02:32 | case/2-import | metadata: logger.go:42: 18:02:32 | case/2-import | annotations: logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-pending: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-succeeded: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | crossplane.io/paused: "false" logger.go:42: 18:02:32 | case/2-import | meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment logger.go:42: 18:02:32 | case/2-import | upjet.upbound.io/test: "true" logger.go:42: 18:02:32 | case/2-import | uptest-old-id: arn:aws:iam::374300188748:policy/ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | finalizers: logger.go:42: 18:02:32 | case/2-import | - finalizer.managedresource.crossplane.io logger.go:42: 18:02:32 | case/2-import | generation: 3 logger.go:42: 18:02:32 | case/2-import | labels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | resourceVersion: "3377" logger.go:42: 18:02:32 | case/2-import | uid: 8271d30d-1437-47d5-80e7-c9e81a9b7702 logger.go:42: 18:02:32 | case/2-import | spec: logger.go:42: 18:02:32 | case/2-import | deletionPolicy: Delete logger.go:42: 18:02:32 | case/2-import | forProvider: logger.go:42: 18:02:32 | case/2-import | description: My test policy logger.go:42: 18:02:32 | case/2-import | path: / logger.go:42: 18:02:32 | case/2-import | policy: | logger.go:42: 18:02:32 | case/2-import | { logger.go:42: 18:02:32 | case/2-import | "Version": "2012-10-17", logger.go:42: 18:02:32 | case/2-import | "Statement": [ logger.go:42: 18:02:32 | case/2-import | { logger.go:42: 18:02:32 | case/2-import | "Effect": "Allow", logger.go:42: 18:02:32 | case/2-import | "Action": "ec2:Describe*", logger.go:42: 18:02:32 | case/2-import | "Resource": "*" logger.go:42: 18:02:32 | case/2-import | } logger.go:42: 18:02:32 | case/2-import | ] logger.go:42: 18:02:32 | case/2-import | } logger.go:42: 18:02:32 | case/2-import | tags: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: policy.iam.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | initProvider: {} logger.go:42: 18:02:32 | case/2-import | managementPolicies: logger.go:42: 18:02:32 | case/2-import | - '*' logger.go:42: 18:02:32 | case/2-import | providerConfigRef: logger.go:42: 18:02:32 | case/2-import | name: default logger.go:42: 18:02:32 | case/2-import | status: logger.go:42: 18:02:32 | case/2-import | atProvider: logger.go:42: 18:02:32 | case/2-import | arn: arn:aws:iam::374300188748:policy/ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | attachmentCount: 0 logger.go:42: 18:02:32 | case/2-import | description: My test policy logger.go:42: 18:02:32 | case/2-import | id: arn:aws:iam::374300188748:policy/ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | path: / logger.go:42: 18:02:32 | case/2-import | policy: '{"Statement":[{"Action":"ec2:Describe*","Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"}' logger.go:42: 18:02:32 | case/2-import | policyId: ANPAVOJQHUBGHXFPGYTQ2 logger.go:42: 18:02:32 | case/2-import | tags: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: policy.iam.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | tagsAll: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: policy.iam.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | conditions: logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: ReconcileSuccess logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Synced logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Available logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Ready logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: UpToDate logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Test logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Success logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: LastAsyncOperation logger.go:42: 18:02:32 | case/2-import | - apiVersion: iam.aws.upbound.io/v1beta1 logger.go:42: 18:02:32 | case/2-import | kind: Policy logger.go:42: 18:02:32 | case/2-import | metadata: logger.go:42: 18:02:32 | case/2-import | annotations: logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-pending: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-succeeded: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | crossplane.io/paused: "false" logger.go:42: 18:02:32 | case/2-import | meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment logger.go:42: 18:02:32 | case/2-import | upjet.upbound.io/test: "true" logger.go:42: 18:02:32 | case/2-import | uptest-old-id: arn:aws:iam::374300188748:policy/ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | finalizers: logger.go:42: 18:02:32 | case/2-import | - finalizer.managedresource.crossplane.io logger.go:42: 18:02:32 | case/2-import | generation: 3 logger.go:42: 18:02:32 | case/2-import | labels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | resourceVersion: "3375" logger.go:42: 18:02:32 | case/2-import | uid: 03ec511b-e1ac-4dc3-9dd3-a58ecc6775cf logger.go:42: 18:02:32 | case/2-import | spec: logger.go:42: 18:02:32 | case/2-import | deletionPolicy: Delete logger.go:42: 18:02:32 | case/2-import | forProvider: logger.go:42: 18:02:32 | case/2-import | description: My test policy logger.go:42: 18:02:32 | case/2-import | path: / logger.go:42: 18:02:32 | case/2-import | policy: | logger.go:42: 18:02:32 | case/2-import | { logger.go:42: 18:02:32 | case/2-import | "Version": "2012-10-17", logger.go:42: 18:02:32 | case/2-import | "Statement": [ logger.go:42: 18:02:32 | case/2-import | { logger.go:42: 18:02:32 | case/2-import | "Effect": "Allow", logger.go:42: 18:02:32 | case/2-import | "Action": "ec2:Describe*", logger.go:42: 18:02:32 | case/2-import | "Resource": "*" logger.go:42: 18:02:32 | case/2-import | } logger.go:42: 18:02:32 | case/2-import | ] logger.go:42: 18:02:32 | case/2-import | } logger.go:42: 18:02:32 | case/2-import | tags: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: policy.iam.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | initProvider: {} logger.go:42: 18:02:32 | case/2-import | managementPolicies: logger.go:42: 18:02:32 | case/2-import | - '*' logger.go:42: 18:02:32 | case/2-import | providerConfigRef: logger.go:42: 18:02:32 | case/2-import | name: default logger.go:42: 18:02:32 | case/2-import | status: logger.go:42: 18:02:32 | case/2-import | atProvider: logger.go:42: 18:02:32 | case/2-import | arn: arn:aws:iam::374300188748:policy/ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | attachmentCount: 0 logger.go:42: 18:02:32 | case/2-import | description: My test policy logger.go:42: 18:02:32 | case/2-import | id: arn:aws:iam::374300188748:policy/ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | path: / logger.go:42: 18:02:32 | case/2-import | policy: '{"Statement":[{"Action":"ec2:Describe*","Effect":"Allow","Resource":"*"}],"Version":"2012-10-17"}' logger.go:42: 18:02:32 | case/2-import | policyId: ANPAVOJQHUBGFAGUTPADY logger.go:42: 18:02:32 | case/2-import | tags: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: policy.iam.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | tagsAll: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: policy.iam.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | conditions: logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: ReconcileSuccess logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Synced logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Available logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Ready logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: UpToDate logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Test logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Success logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: LastAsyncOperation logger.go:42: 18:02:32 | case/2-import | - apiVersion: ssoadmin.aws.upbound.io/v1beta2 logger.go:42: 18:02:32 | case/2-import | kind: CustomerManagedPolicyAttachment logger.go:42: 18:02:32 | case/2-import | metadata: logger.go:42: 18:02:32 | case/2-import | annotations: logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-pending: "2024-06-10T01:01:59Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-succeeded: "2024-06-10T01:01:59Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-name: ssoadmin-customer-managed-policy-attachment,/,arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | crossplane.io/paused: "false" logger.go:42: 18:02:32 | case/2-import | meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment logger.go:42: 18:02:32 | case/2-import | Amazon Resource Name (ARN) of the SSO Instance under which the operation will logger.go:42: 18:02:32 | case/2-import | be executed). logger.go:42: 18:02:32 | case/2-import | upjet.upbound.io/test: "true" logger.go:42: 18:02:32 | case/2-import | uptest-old-id: ssoadmin-customer-managed-policy-attachment,/,arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | finalizers: logger.go:42: 18:02:32 | case/2-import | - finalizer.managedresource.crossplane.io logger.go:42: 18:02:32 | case/2-import | generation: 2 logger.go:42: 18:02:32 | case/2-import | labels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | resourceVersion: "3372" logger.go:42: 18:02:32 | case/2-import | uid: 9fabc30a-a22c-46df-92e2-f502985802a7 logger.go:42: 18:02:32 | case/2-import | spec: logger.go:42: 18:02:32 | case/2-import | deletionPolicy: Delete logger.go:42: 18:02:32 | case/2-import | forProvider: logger.go:42: 18:02:32 | case/2-import | customerManagedPolicyReference: logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | path: / logger.go:42: 18:02:32 | case/2-import | policyNameRef: logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | policyNameSelector: logger.go:42: 18:02:32 | case/2-import | matchLabels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | permissionSetArn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029 logger.go:42: 18:02:32 | case/2-import | permissionSetArnRef: logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | permissionSetArnSelector: logger.go:42: 18:02:32 | case/2-import | matchLabels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | region: us-east-1 logger.go:42: 18:02:32 | case/2-import | initProvider: {} logger.go:42: 18:02:32 | case/2-import | managementPolicies: logger.go:42: 18:02:32 | case/2-import | - '*' logger.go:42: 18:02:32 | case/2-import | providerConfigRef: logger.go:42: 18:02:32 | case/2-import | name: default logger.go:42: 18:02:32 | case/2-import | status: logger.go:42: 18:02:32 | case/2-import | atProvider: logger.go:42: 18:02:32 | case/2-import | customerManagedPolicyReference: logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | path: / logger.go:42: 18:02:32 | case/2-import | id: ssoadmin-customer-managed-policy-attachment,/,arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | permissionSetArn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029 logger.go:42: 18:02:32 | case/2-import | conditions: logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: ReconcileSuccess logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Synced logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Available logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Ready logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: UpToDate logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Test logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Success logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: LastAsyncOperation logger.go:42: 18:02:32 | case/2-import | - apiVersion: ssoadmin.aws.upbound.io/v1beta2 logger.go:42: 18:02:32 | case/2-import | kind: PermissionsBoundaryAttachment logger.go:42: 18:02:32 | case/2-import | metadata: logger.go:42: 18:02:32 | case/2-import | annotations: logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-pending: "2024-06-10T01:02:03Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-succeeded: "2024-06-10T01:02:03Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-name: ps-d8de297d4028034d logger.go:42: 18:02:32 | case/2-import | crossplane.io/paused: "false" logger.go:42: 18:02:32 | case/2-import | meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment logger.go:42: 18:02:32 | case/2-import | upjet.upbound.io/test: "true" logger.go:42: 18:02:32 | case/2-import | uptest-old-id: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | finalizers: logger.go:42: 18:02:32 | case/2-import | - finalizer.managedresource.crossplane.io logger.go:42: 18:02:32 | case/2-import | generation: 2 logger.go:42: 18:02:32 | case/2-import | labels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | resourceVersion: "3373" logger.go:42: 18:02:32 | case/2-import | uid: 90c49a30-18bd-481d-94e5-dd5d5ad63e66 logger.go:42: 18:02:32 | case/2-import | spec: logger.go:42: 18:02:32 | case/2-import | deletionPolicy: Delete logger.go:42: 18:02:32 | case/2-import | forProvider: logger.go:42: 18:02:32 | case/2-import | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | permissionSetArn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d logger.go:42: 18:02:32 | case/2-import | permissionSetArnRef: logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | permissionSetArnSelector: logger.go:42: 18:02:32 | case/2-import | matchLabels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | permissionsBoundary: logger.go:42: 18:02:32 | case/2-import | customerManagedPolicyReference: logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | nameRef: logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | nameSelector: logger.go:42: 18:02:32 | case/2-import | matchLabels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | path: / logger.go:42: 18:02:32 | case/2-import | region: us-east-1 logger.go:42: 18:02:32 | case/2-import | initProvider: {} logger.go:42: 18:02:32 | case/2-import | managementPolicies: logger.go:42: 18:02:32 | case/2-import | - '*' logger.go:42: 18:02:32 | case/2-import | providerConfigRef: logger.go:42: 18:02:32 | case/2-import | name: default logger.go:42: 18:02:32 | case/2-import | status: logger.go:42: 18:02:32 | case/2-import | atProvider: logger.go:42: 18:02:32 | case/2-import | id: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | permissionSetArn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d logger.go:42: 18:02:32 | case/2-import | permissionsBoundary: logger.go:42: 18:02:32 | case/2-import | customerManagedPolicyReference: logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | path: / logger.go:42: 18:02:32 | case/2-import | managedPolicyArn: "" logger.go:42: 18:02:32 | case/2-import | conditions: logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: ReconcileSuccess logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Synced logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Available logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Ready logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: UpToDate logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Test logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Success logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: LastAsyncOperation logger.go:42: 18:02:32 | case/2-import | - apiVersion: ssoadmin.aws.upbound.io/v1beta1 logger.go:42: 18:02:32 | case/2-import | kind: PermissionSet logger.go:42: 18:02:32 | case/2-import | metadata: logger.go:42: 18:02:32 | case/2-import | annotations: logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-pending: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-succeeded: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-name: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | crossplane.io/paused: "false" logger.go:42: 18:02:32 | case/2-import | meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment logger.go:42: 18:02:32 | case/2-import | upjet.upbound.io/test: "true" logger.go:42: 18:02:32 | case/2-import | uptest-old-id: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | finalizers: logger.go:42: 18:02:32 | case/2-import | - finalizer.managedresource.crossplane.io logger.go:42: 18:02:32 | case/2-import | generation: 3 logger.go:42: 18:02:32 | case/2-import | labels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | resourceVersion: "3376" logger.go:42: 18:02:32 | case/2-import | uid: 738346c2-8f02-43c9-b61b-9ec179566301 logger.go:42: 18:02:32 | case/2-import | spec: logger.go:42: 18:02:32 | case/2-import | deletionPolicy: Delete logger.go:42: 18:02:32 | case/2-import | forProvider: logger.go:42: 18:02:32 | case/2-import | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | name: example-cmpa logger.go:42: 18:02:32 | case/2-import | region: us-east-1 logger.go:42: 18:02:32 | case/2-import | sessionDuration: PT1H logger.go:42: 18:02:32 | case/2-import | tags: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: permissionset.ssoadmin.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | initProvider: {} logger.go:42: 18:02:32 | case/2-import | managementPolicies: logger.go:42: 18:02:32 | case/2-import | - '*' logger.go:42: 18:02:32 | case/2-import | providerConfigRef: logger.go:42: 18:02:32 | case/2-import | name: default logger.go:42: 18:02:32 | case/2-import | status: logger.go:42: 18:02:32 | case/2-import | atProvider: logger.go:42: 18:02:32 | case/2-import | arn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029 logger.go:42: 18:02:32 | case/2-import | createdDate: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | description: "" logger.go:42: 18:02:32 | case/2-import | id: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | name: example-cmpa logger.go:42: 18:02:32 | case/2-import | relayState: "" logger.go:42: 18:02:32 | case/2-import | sessionDuration: PT1H logger.go:42: 18:02:32 | case/2-import | tags: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: permissionset.ssoadmin.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | tagsAll: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: permissionset.ssoadmin.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | conditions: logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: ReconcileSuccess logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Synced logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Available logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Ready logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: UpToDate logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Test logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Success logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: LastAsyncOperation logger.go:42: 18:02:32 | case/2-import | - apiVersion: ssoadmin.aws.upbound.io/v1beta1 logger.go:42: 18:02:32 | case/2-import | kind: PermissionSet logger.go:42: 18:02:32 | case/2-import | metadata: logger.go:42: 18:02:32 | case/2-import | annotations: logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-pending: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-create-succeeded: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | crossplane.io/external-name: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | crossplane.io/paused: "false" logger.go:42: 18:02:32 | case/2-import | meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment logger.go:42: 18:02:32 | case/2-import | upjet.upbound.io/test: "true" logger.go:42: 18:02:32 | case/2-import | uptest-old-id: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | finalizers: logger.go:42: 18:02:32 | case/2-import | - finalizer.managedresource.crossplane.io logger.go:42: 18:02:32 | case/2-import | generation: 3 logger.go:42: 18:02:32 | case/2-import | labels: logger.go:42: 18:02:32 | case/2-import | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | resourceVersion: "3374" logger.go:42: 18:02:32 | case/2-import | uid: 48ade53f-717b-4971-b87c-687a6c23aab5 logger.go:42: 18:02:32 | case/2-import | spec: logger.go:42: 18:02:32 | case/2-import | deletionPolicy: Delete logger.go:42: 18:02:32 | case/2-import | forProvider: logger.go:42: 18:02:32 | case/2-import | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | name: example-pba logger.go:42: 18:02:32 | case/2-import | region: us-east-1 logger.go:42: 18:02:32 | case/2-import | sessionDuration: PT1H logger.go:42: 18:02:32 | case/2-import | tags: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: permissionset.ssoadmin.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | initProvider: {} logger.go:42: 18:02:32 | case/2-import | managementPolicies: logger.go:42: 18:02:32 | case/2-import | - '*' logger.go:42: 18:02:32 | case/2-import | providerConfigRef: logger.go:42: 18:02:32 | case/2-import | name: default logger.go:42: 18:02:32 | case/2-import | status: logger.go:42: 18:02:32 | case/2-import | atProvider: logger.go:42: 18:02:32 | case/2-import | arn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d logger.go:42: 18:02:32 | case/2-import | createdDate: "2024-06-10T01:01:58Z" logger.go:42: 18:02:32 | case/2-import | description: "" logger.go:42: 18:02:32 | case/2-import | id: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:32 | case/2-import | name: example-pba logger.go:42: 18:02:32 | case/2-import | relayState: "" logger.go:42: 18:02:32 | case/2-import | sessionDuration: PT1H logger.go:42: 18:02:32 | case/2-import | tags: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: permissionset.ssoadmin.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | tagsAll: logger.go:42: 18:02:32 | case/2-import | crossplane-kind: permissionset.ssoadmin.aws.upbound.io logger.go:42: 18:02:32 | case/2-import | crossplane-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:32 | case/2-import | crossplane-providerconfig: default logger.go:42: 18:02:32 | case/2-import | conditions: logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: ReconcileSuccess logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Synced logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Available logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Ready logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: UpToDate logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: Test logger.go:42: 18:02:32 | case/2-import | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:32 | case/2-import | reason: Success logger.go:42: 18:02:32 | case/2-import | status: "True" logger.go:42: 18:02:32 | case/2-import | type: LastAsyncOperation logger.go:42: 18:02:32 | case/2-import | kind: List logger.go:42: 18:02:32 | case/2-import | metadata: logger.go:42: 18:02:32 | case/2-import | resourceVersion: "" logger.go:42: 18:02:32 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:33 | case/2-import | customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment condition met logger.go:42: 18:02:33 | case/2-import | running command: [sh -c new_id="$(${KUBECTL} get customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment -o=jsonpath='{.status.atProvider.id}')" && old_id="$(${KUBECTL} get customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment -o=jsonpath='{.metadata.annotations.uptest-old-id}')" && [ "$new_id" = "$old_id" ]] logger.go:42: 18:02:33 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:33 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment condition met logger.go:42: 18:02:33 | case/2-import | running command: [sh -c new_id="$(${KUBECTL} get policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment -o=jsonpath='{.status.atProvider.id}')" && old_id="$(${KUBECTL} get policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment -o=jsonpath='{.metadata.annotations.uptest-old-id}')" && [ "$new_id" = "$old_id" ]] logger.go:42: 18:02:33 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:33 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment condition met logger.go:42: 18:02:33 | case/2-import | running command: [sh -c new_id="$(${KUBECTL} get permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment -o=jsonpath='{.status.atProvider.id}')" && old_id="$(${KUBECTL} get permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment -o=jsonpath='{.metadata.annotations.uptest-old-id}')" && [ "$new_id" = "$old_id" ]] logger.go:42: 18:02:33 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:33 | case/2-import | permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment condition met logger.go:42: 18:02:33 | case/2-import | running command: [sh -c new_id="$(${KUBECTL} get permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment -o=jsonpath='{.status.atProvider.id}')" && old_id="$(${KUBECTL} get permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment -o=jsonpath='{.metadata.annotations.uptest-old-id}')" && [ "$new_id" = "$old_id" ]] logger.go:42: 18:02:34 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:34 | case/2-import | policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment condition met logger.go:42: 18:02:34 | case/2-import | running command: [sh -c new_id="$(${KUBECTL} get policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment -o=jsonpath='{.status.atProvider.id}')" && old_id="$(${KUBECTL} get policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment -o=jsonpath='{.metadata.annotations.uptest-old-id}')" && [ "$new_id" = "$old_id" ]] logger.go:42: 18:02:34 | case/2-import | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=condition=Test --timeout 10s] logger.go:42: 18:02:34 | case/2-import | permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment condition met logger.go:42: 18:02:34 | case/2-import | running command: [sh -c new_id="$(${KUBECTL} get permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment -o=jsonpath='{.status.atProvider.id}')" && old_id="$(${KUBECTL} get permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment -o=jsonpath='{.metadata.annotations.uptest-old-id}')" && [ "$new_id" = "$old_id" ]] logger.go:42: 18:02:34 | case/2-import | test step completed 2-import logger.go:42: 18:02:34 | case/3-delete | starting test step 3-delete logger.go:42: 18:02:34 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 delete customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --wait=false --ignore-not-found] logger.go:42: 18:02:34 | case/3-delete | customermanagedpolicyattachment.ssoadmin.aws.upbound.io "ssoadmin-customer-managed-policy-attachment" deleted logger.go:42: 18:02:34 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 delete policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --wait=false --ignore-not-found] logger.go:42: 18:02:34 | case/3-delete | policy.iam.aws.upbound.io "ssoadmin-customer-managed-policy-attachment" deleted logger.go:42: 18:02:34 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 delete permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --wait=false --ignore-not-found] logger.go:42: 18:02:34 | case/3-delete | permissionset.ssoadmin.aws.upbound.io "ssoadmin-customer-managed-policy-attachment" deleted logger.go:42: 18:02:34 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 delete permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment --wait=false --ignore-not-found] logger.go:42: 18:02:34 | case/3-delete | permissionsboundaryattachment.ssoadmin.aws.upbound.io "ssoadmin-permissions-boundary-attachment" deleted logger.go:42: 18:02:34 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 delete policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment --wait=false --ignore-not-found] logger.go:42: 18:02:35 | case/3-delete | policy.iam.aws.upbound.io "ssoadmin-permissions-boundary-attachment" deleted logger.go:42: 18:02:35 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 delete permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment --wait=false --ignore-not-found] logger.go:42: 18:02:35 | case/3-delete | permissionset.ssoadmin.aws.upbound.io "ssoadmin-permissions-boundary-attachment" deleted logger.go:42: 18:02:35 | case/3-delete | running command: [sh -c echo "Dump MR manifests for the delete assertion step:"; ${KUBECTL} get managed -o yaml] logger.go:42: 18:02:35 | case/3-delete | Dump MR manifests for the delete assertion step: logger.go:42: 18:02:35 | case/3-delete | apiVersion: v1 logger.go:42: 18:02:35 | case/3-delete | items: logger.go:42: 18:02:35 | case/3-delete | - apiVersion: ssoadmin.aws.upbound.io/v1beta2 logger.go:42: 18:02:35 | case/3-delete | kind: CustomerManagedPolicyAttachment logger.go:42: 18:02:35 | case/3-delete | metadata: logger.go:42: 18:02:35 | case/3-delete | annotations: logger.go:42: 18:02:35 | case/3-delete | crossplane.io/external-create-pending: "2024-06-10T01:01:59Z" logger.go:42: 18:02:35 | case/3-delete | crossplane.io/external-create-succeeded: "2024-06-10T01:01:59Z" logger.go:42: 18:02:35 | case/3-delete | crossplane.io/external-name: ssoadmin-customer-managed-policy-attachment,/,arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | crossplane.io/paused: "false" logger.go:42: 18:02:35 | case/3-delete | meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment logger.go:42: 18:02:35 | case/3-delete | Amazon Resource Name (ARN) of the SSO Instance under which the operation will logger.go:42: 18:02:35 | case/3-delete | be executed). logger.go:42: 18:02:35 | case/3-delete | upjet.upbound.io/test: "true" logger.go:42: 18:02:35 | case/3-delete | uptest-old-id: ssoadmin-customer-managed-policy-attachment,/,arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:02:35 | case/3-delete | deletionGracePeriodSeconds: 0 logger.go:42: 18:02:35 | case/3-delete | deletionTimestamp: "2024-06-10T01:02:34Z" logger.go:42: 18:02:35 | case/3-delete | finalizers: logger.go:42: 18:02:35 | case/3-delete | - finalizer.managedresource.crossplane.io logger.go:42: 18:02:35 | case/3-delete | generation: 3 logger.go:42: 18:02:35 | case/3-delete | labels: logger.go:42: 18:02:35 | case/3-delete | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:35 | case/3-delete | resourceVersion: "3391" logger.go:42: 18:02:35 | case/3-delete | uid: 9fabc30a-a22c-46df-92e2-f502985802a7 logger.go:42: 18:02:35 | case/3-delete | spec: logger.go:42: 18:02:35 | case/3-delete | deletionPolicy: Delete logger.go:42: 18:02:35 | case/3-delete | forProvider: logger.go:42: 18:02:35 | case/3-delete | customerManagedPolicyReference: logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:35 | case/3-delete | path: / logger.go:42: 18:02:35 | case/3-delete | policyNameRef: logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:35 | case/3-delete | policyNameSelector: logger.go:42: 18:02:35 | case/3-delete | matchLabels: logger.go:42: 18:02:35 | case/3-delete | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:35 | case/3-delete | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | permissionSetArn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029 logger.go:42: 18:02:35 | case/3-delete | permissionSetArnRef: logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:35 | case/3-delete | permissionSetArnSelector: logger.go:42: 18:02:35 | case/3-delete | matchLabels: logger.go:42: 18:02:35 | case/3-delete | testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:35 | case/3-delete | region: us-east-1 logger.go:42: 18:02:35 | case/3-delete | initProvider: {} logger.go:42: 18:02:35 | case/3-delete | managementPolicies: logger.go:42: 18:02:35 | case/3-delete | - '*' logger.go:42: 18:02:35 | case/3-delete | providerConfigRef: logger.go:42: 18:02:35 | case/3-delete | name: default logger.go:42: 18:02:35 | case/3-delete | status: logger.go:42: 18:02:35 | case/3-delete | atProvider: logger.go:42: 18:02:35 | case/3-delete | customerManagedPolicyReference: logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-customer-managed-policy-attachment logger.go:42: 18:02:35 | case/3-delete | path: / logger.go:42: 18:02:35 | case/3-delete | id: ssoadmin-customer-managed-policy-attachment,/,arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | permissionSetArn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-99632d4314cf6029 logger.go:42: 18:02:35 | case/3-delete | conditions: logger.go:42: 18:02:35 | case/3-delete | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:35 | case/3-delete | reason: ReconcileSuccess logger.go:42: 18:02:35 | case/3-delete | status: "True" logger.go:42: 18:02:35 | case/3-delete | type: Synced logger.go:42: 18:02:35 | case/3-delete | - lastTransitionTime: "2024-06-10T01:02:34Z" logger.go:42: 18:02:35 | case/3-delete | reason: Deleting logger.go:42: 18:02:35 | case/3-delete | status: "False" logger.go:42: 18:02:35 | case/3-delete | type: Ready logger.go:42: 18:02:35 | case/3-delete | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:35 | case/3-delete | reason: UpToDate logger.go:42: 18:02:35 | case/3-delete | status: "True" logger.go:42: 18:02:35 | case/3-delete | type: Test logger.go:42: 18:02:35 | case/3-delete | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:35 | case/3-delete | reason: Success logger.go:42: 18:02:35 | case/3-delete | status: "True" logger.go:42: 18:02:35 | case/3-delete | type: LastAsyncOperation logger.go:42: 18:02:35 | case/3-delete | - apiVersion: ssoadmin.aws.upbound.io/v1beta2 logger.go:42: 18:02:35 | case/3-delete | kind: PermissionsBoundaryAttachment logger.go:42: 18:02:35 | case/3-delete | metadata: logger.go:42: 18:02:35 | case/3-delete | annotations: logger.go:42: 18:02:35 | case/3-delete | crossplane.io/external-create-pending: "2024-06-10T01:02:03Z" logger.go:42: 18:02:35 | case/3-delete | crossplane.io/external-create-succeeded: "2024-06-10T01:02:03Z" logger.go:42: 18:02:35 | case/3-delete | crossplane.io/external-name: ps-d8de297d4028034d logger.go:42: 18:02:35 | case/3-delete | crossplane.io/paused: "false" logger.go:42: 18:02:35 | case/3-delete | meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment logger.go:42: 18:02:35 | case/3-delete | upjet.upbound.io/test: "true" logger.go:42: 18:02:35 | case/3-delete | uptest-old-id: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | creationTimestamp: "2024-06-10T01:01:58Z" logger.go:42: 18:02:35 | case/3-delete | deletionGracePeriodSeconds: 0 logger.go:42: 18:02:35 | case/3-delete | deletionTimestamp: "2024-06-10T01:02:34Z" logger.go:42: 18:02:35 | case/3-delete | finalizers: logger.go:42: 18:02:35 | case/3-delete | - finalizer.managedresource.crossplane.io logger.go:42: 18:02:35 | case/3-delete | generation: 3 logger.go:42: 18:02:35 | case/3-delete | labels: logger.go:42: 18:02:35 | case/3-delete | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:35 | case/3-delete | resourceVersion: "3400" logger.go:42: 18:02:35 | case/3-delete | uid: 90c49a30-18bd-481d-94e5-dd5d5ad63e66 logger.go:42: 18:02:35 | case/3-delete | spec: logger.go:42: 18:02:35 | case/3-delete | deletionPolicy: Delete logger.go:42: 18:02:35 | case/3-delete | forProvider: logger.go:42: 18:02:35 | case/3-delete | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | permissionSetArn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d logger.go:42: 18:02:35 | case/3-delete | permissionSetArnRef: logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:35 | case/3-delete | permissionSetArnSelector: logger.go:42: 18:02:35 | case/3-delete | matchLabels: logger.go:42: 18:02:35 | case/3-delete | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:35 | case/3-delete | permissionsBoundary: logger.go:42: 18:02:35 | case/3-delete | customerManagedPolicyReference: logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:35 | case/3-delete | nameRef: logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:35 | case/3-delete | nameSelector: logger.go:42: 18:02:35 | case/3-delete | matchLabels: logger.go:42: 18:02:35 | case/3-delete | testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:35 | case/3-delete | path: / logger.go:42: 18:02:35 | case/3-delete | region: us-east-1 logger.go:42: 18:02:35 | case/3-delete | initProvider: {} logger.go:42: 18:02:35 | case/3-delete | managementPolicies: logger.go:42: 18:02:35 | case/3-delete | - '*' logger.go:42: 18:02:35 | case/3-delete | providerConfigRef: logger.go:42: 18:02:35 | case/3-delete | name: default logger.go:42: 18:02:35 | case/3-delete | status: logger.go:42: 18:02:35 | case/3-delete | atProvider: logger.go:42: 18:02:35 | case/3-delete | id: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d,arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | instanceArn: arn:aws:sso:::instance/ssoins-7223ae4e1f24fd4c logger.go:42: 18:02:35 | case/3-delete | permissionSetArn: arn:aws:sso:::permissionSet/ssoins-7223ae4e1f24fd4c/ps-d8de297d4028034d logger.go:42: 18:02:35 | case/3-delete | permissionsBoundary: logger.go:42: 18:02:35 | case/3-delete | customerManagedPolicyReference: logger.go:42: 18:02:35 | case/3-delete | name: ssoadmin-permissions-boundary-attachment logger.go:42: 18:02:35 | case/3-delete | path: / logger.go:42: 18:02:35 | case/3-delete | managedPolicyArn: "" logger.go:42: 18:02:35 | case/3-delete | conditions: logger.go:42: 18:02:35 | case/3-delete | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:35 | case/3-delete | reason: ReconcileSuccess logger.go:42: 18:02:35 | case/3-delete | status: "True" logger.go:42: 18:02:35 | case/3-delete | type: Synced logger.go:42: 18:02:35 | case/3-delete | - lastTransitionTime: "2024-06-10T01:02:35Z" logger.go:42: 18:02:35 | case/3-delete | reason: Deleting logger.go:42: 18:02:35 | case/3-delete | status: "False" logger.go:42: 18:02:35 | case/3-delete | type: Ready logger.go:42: 18:02:35 | case/3-delete | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:35 | case/3-delete | reason: UpToDate logger.go:42: 18:02:35 | case/3-delete | status: "True" logger.go:42: 18:02:35 | case/3-delete | type: Test logger.go:42: 18:02:35 | case/3-delete | - lastTransitionTime: "2024-06-10T01:02:32Z" logger.go:42: 18:02:35 | case/3-delete | reason: Success logger.go:42: 18:02:35 | case/3-delete | status: "True" logger.go:42: 18:02:35 | case/3-delete | type: LastAsyncOperation logger.go:42: 18:02:35 | case/3-delete | kind: List logger.go:42: 18:02:35 | case/3-delete | metadata: logger.go:42: 18:02:35 | case/3-delete | resourceVersion: "" logger.go:42: 18:02:35 | case/3-delete | running command: [sh -c echo "Dump Claim manifests for the delete assertion step:" || ${KUBECTL} get claim --all-namespaces -o yaml] logger.go:42: 18:02:35 | case/3-delete | Dump Claim manifests for the delete assertion step: logger.go:42: 18:02:35 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=delete --timeout 10s] logger.go:42: 18:02:40 | case/3-delete | customermanagedpolicyattachment.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment condition met logger.go:42: 18:02:40 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait policy.iam.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=delete --timeout 10s] logger.go:42: 18:02:40 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionset.ssoadmin.aws.upbound.io/ssoadmin-customer-managed-policy-attachment --for=delete --timeout 10s] logger.go:42: 18:02:40 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionsboundaryattachment.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=delete --timeout 10s] logger.go:42: 18:02:40 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait policy.iam.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=delete --timeout 10s] logger.go:42: 18:02:40 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait permissionset.ssoadmin.aws.upbound.io/ssoadmin-permissions-boundary-attachment --for=delete --timeout 10s] logger.go:42: 18:02:40 | case/3-delete | running command: [/home/matt/git/upbound-provider-aws/.cache/tools/linux_x86_64/kubectl-v1.24.3 wait managed --all --for=delete --timeout 10s] logger.go:42: 18:02:41 | case/3-delete | test step completed 3-delete logger.go:42: 18:02:41 | case | Failed to collect events for case in ns kuttl-test-hot-moray: no matches for kind "Event" in version "events.k8s.io/v1beta1" logger.go:42: 18:02:41 | case | Trying with events eventsv1 API... logger.go:42: 18:02:41 | case | case events from ns kuttl-test-hot-moray: logger.go:42: 18:02:41 | case | Deleting namespace: kuttl-test-hot-moray === CONT kuttl harness.go:402: run tests finished harness.go:511: cleaning up harness.go:553: skipping cluster tear down harness.go:554: to connect to the cluster, run: export KUBECONFIG="/home/matt/git/upbound-provider-aws/kubeconfig" --- PASS: kuttl (45.02s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/case (43.79s) PASS 18:02:41 [ OK ] running automated tests