-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Continual reconciliation on Azure provider on error #439
Comments
Another example I have found in logs, you can see the
|
@stevendborrelli, Thanks for your report. Here are the takeaways followed by the details of my investigation:
Below output demonstrates the behavior in action. I omitted duplicate lines for brevity. In the real output, each line except the first one occurs twice, once for “Synced” and once for “Ready” status condition updates. And, if you see “Synced: True” at the beginning, don't be surprised. It's also because of crossplane-runtime not being async aware. > k get key.v1beta1.keyvault.azure.upbound.io -w
NAME SYNCED READY EXTERNAL-NAME AGE
issue-439-key False False 3s
issue-439-key False False 56s
issue-439-key False False 58s
issue-439-key False False 59s
issue-439-key False False 60s
issue-439-key False False 61s
issue-439-key False False 62s
issue-439-key False False 64s
issue-439-key False False 66s
issue-439-key False False 68s
issue-439-key False False 72s
issue-439-key False False 78s
issue-439-key False False 90s
issue-439-key False False 112s
issue-439-key False False 2m34s
issue-439-key False False 3m35s
issue-439-key False False 4m35s Even though the creation grace period is 30 seconds, it ends at 56 seconds in the output above. I haven't investigated the details of how it extends beyond 30 seconds, but given that reconciliation is not hard-real time and there are other variables, such as jitter, in effect, I'm not surprised. For reference, this block of the managed reconciler executes during this phase. After the grace period, this block of the managed reconciler executes. As you can see, returned reconciliation result only has After the grace period, at 56 seconds, we see that the durations between status condition updates increase. The intervals don't look like they would fit an exponential curve because of the lack of time resolution in the output. If you examine timestamped pod logs below, you'll see that the backoffs are exponential, starting with 5 ms and doubling. Backoffs in the order of milliseconds are difficult to observe above. When the backoff duration increases to the order of seconds, they are not integral numbers, but fractional like 1.28, 2.56, 5.12 seconds, which is also difficult to observe. Timestamps indicate that exponential backoff is working as expected. Backoff duration is capped at 1 minute by crossplane-runtime, which is configured again in crossplane-runtime, which is called by the provider. Let me know if you have further questions. Output during the creation grace period (Extra newlines are added for better readability. Also note that there is a single “Async create starting...” message):2024-09-29T22:57:35+03:00 DEBUG provider-azure Calling the inner handler for Create event. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "queueLength": 0}
2024-09-29T22:57:35+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:57:35+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:35+03:00 DEBUG provider-azure Calling the inner handler for Update event. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "queueLength": 0}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Calling the inner handler for Update event. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "queueLength": 0}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Successfully requested creation of external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333597", "external-name": "", "external-name": ""}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Calling the inner handler for Update event. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "queueLength": 0}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:36+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:36+03:00 DEBUG provider-azure ongoing async operation {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "opType": "create"}
2024-09-29T22:57:36+03:00 DEBUG provider-azure External resource is up to date {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333605", "external-name": "", "requeue-after": "2024-09-29T23:08:06+03:00"}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "5ms"}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Waiting for external resource existence to be confirmed {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333607", "external-name": ""}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:57:37+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:38+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:38+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:38+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:57:38+03:00 DEBUG provider-azure Waiting for external resource existence to be confirmed {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333608", "external-name": ""}
2024-09-29T22:57:41+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:57:41+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:42+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:42+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:42+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:57:42+03:00 DEBUG provider-azure Waiting for external resource existence to be confirmed {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333608", "external-name": ""}
2024-09-29T22:57:58+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:57:58+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:58+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:58+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:57:58+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:57:58+03:00 DEBUG provider-azure Waiting for external resource existence to be confirmed {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333608", "external-name": ""} Output after the creation grace period (Extra newlines are added for better readability. Also note that there is one “Async create starting...” message per “Reconciling” message):2024-09-29T22:58:30+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:30+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:31+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:31+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:31+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:31+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333608", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:31+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:31+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:32+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:32+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "10ms"}
2024-09-29T22:58:32+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:32+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333713", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "20ms"}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:33+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333720", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "40ms"}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:34+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:35+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:35+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:35+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:35+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333726", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:35+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:35+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "80ms"}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333728", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:36+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "160ms"}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333734", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:37+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:38+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:38+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "320ms"}
2024-09-29T22:58:39+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:39+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:39+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:39+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:39+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:39+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333741", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:39+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:39+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:40+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:40+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "640ms"}
2024-09-29T22:58:40+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:40+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:41+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:41+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:41+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:41+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333746", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:41+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:41+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:41+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:41+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "1.28s"}
2024-09-29T22:58:43+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:43+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:43+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:43+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:43+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:43+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333753", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:43+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:43+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:44+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:44+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "2.56s"}
2024-09-29T22:58:46+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:46+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:47+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:47+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:47+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:47+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333759", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:47+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:47+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:48+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:48+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "5.12s"}
2024-09-29T22:58:53+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:58:53+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:53+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:53+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:53+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:58:53+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333768", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:58:53+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:58:53+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:58:54+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:58:54+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "10.24s"}
2024-09-29T22:59:04+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:59:04+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:59:05+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:59:05+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:59:05+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:59:05+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333783", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:59:05+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:59:05+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:59:05+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:59:05+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "20.48s"}
2024-09-29T22:59:26+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T22:59:26+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:59:27+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:59:27+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:59:27+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T22:59:27+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333807", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T22:59:27+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T22:59:27+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T22:59:27+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T22:59:27+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "40.96s"}
2024-09-29T23:00:08+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T23:00:08+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:00:09+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:00:09+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:00:09+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T23:00:09+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333848", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T23:00:09+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T23:00:09+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:00:10+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T23:00:10+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "1m21.92s"}
2024-09-29T23:01:09+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T23:01:09+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:01:10+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:01:10+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:01:10+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T23:01:10+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "333927", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T23:01:10+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T23:01:10+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:01:10+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T23:01:10+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "2m43.84s"}
2024-09-29T23:02:10+03:00 DEBUG provider-azure Reconciling {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}}
2024-09-29T23:02:10+03:00 DEBUG provider-azure Connecting to the service provider {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:02:10+03:00 DEBUG provider-azure Instance state not found in cache, reconstructing... {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:02:10+03:00 DEBUG provider-azure Observing the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:02:10+03:00 DEBUG provider-azure Diff detected {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "instanceDiff": "*terraform.InstanceDiff{mu:sync.Mutex{state:0, sema:0x0}, Attributes:map[string]*terraform.ResourceAttrDiff{\"curve\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"e\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"6\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.0\":*terraform.ResourceAttrDiff{Old:\"\", New:\"decrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.1\":*terraform.ResourceAttrDiff{Old:\"\", New:\"encrypt\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.2\":*terraform.ResourceAttrDiff{Old:\"\", New:\"sign\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.3\":*terraform.ResourceAttrDiff{Old:\"\", New:\"unwrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.4\":*terraform.ResourceAttrDiff{Old:\"\", New:\"verify\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_opts.5\":*terraform.ResourceAttrDiff{Old:\"\", New:\"wrapKey\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"key_size\":*terraform.ResourceAttrDiff{Old:\"\", New:\"2048\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_type\":*terraform.ResourceAttrDiff{Old:\"\", New:\"RSA\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"key_vault_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"/subscriptions/038f2b7c-3265-43b8-8624-c9ad5da610a8/resourceGroups/issue-439-resourcegroup/providers/Microsoft.KeyVault/vaults/issue-439-vault\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"n\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"name\":*terraform.ResourceAttrDiff{Old:\"\", New:\"issue-439-key\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:true, Sensitive:false, Type:0x0}, \"public_key_openssh\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"public_key_pem\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"resource_versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"3\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.#\":*terraform.ResourceAttrDiff{Old:\"0\", New:\"1\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.0.automatic.0.time_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P30D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.1.expire_after\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P90D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"rotation_policy.2.notify_before_expiry\":*terraform.ResourceAttrDiff{Old:\"\", New:\"P29D\", NewComputed:false, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"version\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"versionless_id\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"x\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}, \"y\":*terraform.ResourceAttrDiff{Old:\"\", New:\"\", NewComputed:true, NewRemoved:false, NewExtra:interface {}(nil), RequiresNew:false, Sensitive:false, Type:0x0}}, Destroy:false, DestroyDeposed:false, DestroyTainted:false, RawConfig:cty.NilVal, RawState:cty.NilVal, RawPlan:cty.NilVal, Meta:map[string]interface {}(nil)}"}
2024-09-29T23:02:10+03:00 DEBUG provider-azure Cannot create external resource {"controller": "managed/keyvault.azure.upbound.io/v1beta1, kind=key", "request": {"name":"issue-439-key"}, "uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "version": "334039", "external-name": "", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]"}
2024-09-29T23:02:10+03:00 DEBUG provider-azure Async create starting... {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "tfID": ""}
2024-09-29T23:02:10+03:00 DEBUG provider-azure Creating the external resource {"uid": "349afc9a-e839-48a7-a007-de43fdca00ea", "name": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key"}
2024-09-29T23:02:11+03:00 DEBUG provider-azure Async create ended. {"trackerUID": "349afc9a-e839-48a7-a007-de43fdca00ea", "resourceName": "issue-439-key", "gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "error": "async create failed: failed to create the resource: [{0 checking for presence of existing Key \"issue-439-key\" (Key Vault \"https://issue-439-vault.vault.azure.net/\"): keyvault.BaseClient#GetKey: Failure responding to request: StatusCode=403 -- Original Error: autorest/azure: Service returned an error. Status=403 Code=\"Forbidden\" Message=\"The user, group or application 'appid=2556f524-5663-461a-874a-9cd47448b031;oid=3be15ce8-4c2e-47d3-98eb-a3aac9e5343b;iss=https://sts.windows.net/b9925bc4-8383-4c37-b9d2-fa456d1bb1c7/' does not have keys get permission on key vault 'issue-439-vault;location=uksouth'. For help resolving this issue, please see https://go.microsoft.com/fwlink/?linkid=2125287\" InnerError={\"code\":\"AccessDenied\"} []}]", "tfID": ""}
2024-09-29T23:02:11+03:00 DEBUG provider-azure Reconcile request has been requeued. {"gvk": "keyvault.azure.upbound.io/v1beta1, Kind=Key", "name": "issue-439-key", "rateLimiterName": "asyncCallback", "when": "5m27.68s"} |
I'm going to go ahead and close this issue. @stevendborrelli if there's any further info that contradicts the explanation let us know. |
What happened?
When trying to provision a resource in error on Azure (due to the issue fixed in #435 we can't see the exact error), the provider constantly tries to create the resource.
With Azure provider 1.2.0, the requeue is increased up to 16m40s, but the object still reconciles a few times a minute:
With Azure provider 1.5.0, it requires at 0s but eventually settles in to checking on the error create every 30s.
How can we reproduce it?
Create any resource that has an error in provisioning:
The text was updated successfully, but these errors were encountered: