Created
August 4, 2019 23:02
-
-
Save kinghrothgar/7e52a1c26a78c4d1a86576d41a9c3814 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
+ create | |
Terraform will perform the following actions: | |
# vault_approle_auth_backend_role.staging_grpc_ssl_example will be created | |
+ resource "vault_approle_auth_backend_role" "staging_grpc_ssl_example" { | |
+ backend = "approle_staging" | |
+ bind_secret_id = true | |
+ id = (known after apply) | |
+ policies = [ | |
+ "staging_grpc_ssl_example", | |
] | |
+ role_id = (known after apply) | |
+ role_name = "grpc_ssl_example" | |
} | |
Plan: 1 to add, 0 to change, 0 to destroy. | |
Do you want to perform these actions in workspace "vault-config"? | |
Terraform will perform the actions described above. | |
Only 'yes' will be accepted to approve. | |
Enter a value: yes | |
vault_approle_auth_backend_role.staging_grpc_ssl_example: Creating... | |
Error: rpc error: code = Unavailable desc = transport is closing | |
panic: interface conversion: interface {} is nil, not json.Number | |
2019-08-04T18:51:22.688-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: | |
2019-08-04T18:51:22.688-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: goroutine 60 [running]: | |
2019-08-04T18:51:22.688-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vault.approleAuthBackendRoleRead(0xc000117180, 0x1eb1bc0, 0xc0002ba690, 0x1cc2180, 0x2c5fb20) | |
2019-08-04T18:51:22.688-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vault/resource_approle_auth_backend_role.go:254 +0x1f8c | |
2019-08-04T18:51:22.688-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vault.approleAuthBackendRoleCreate(0xc000117180, 0x1eb1bc0, 0xc0002ba690, 0x2, 0x2c5fb20) | |
2019-08-04T18:51:22.688-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vault/resource_approle_auth_backend_role.go:181 +0xc15 | |
2019-08-04T18:51:22.688-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Apply(0xc000314900, 0xc000288fa0, 0xc00000d440, 0x1eb1bc0, 0xc0002ba690, | |
0xc0004afc01, 0xc00061aa58, 0x1d2a9e0) | |
2019-08-04T18:51:22.688-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:286 +0x3b4 | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Apply(0xc000145700, 0xc0001bda30, 0xc000288fa0, 0xc00000d440, 0xc00061aa | |
68, 0xc00013c060, 0x1d2cae0) | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:285 +0x18f | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/plugin.(*GRPCProviderServer).ApplyResourceChange(0xc00000e678, 0x21772e0, 0xc0004aeb70, 0xc | |
00057e360, 0xc00000e678, 0xc0004aeb70, 0xc0002b3ba8) | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/helper/plugin/grpc_provider.go:851 +0x894 | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/internal/tfplugin5._Provider_ApplyResourceChange_Handler(0x1e8d680, 0xc00000e678, 0x21772e0, 0xc00 | |
04aeb70, 0xc0002885a0, 0x0, 0x21772e0, 0xc0004aeb70, 0xc0004c8240, 0x21d) | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/github.com/hashicorp/terraform/internal/tfplugin5/tfplugin5.pb.go:3217 +0x2 | |
3e | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc.(*Server).processUnaryRPC(0xc000001500, 0x2183fe0, 0xc00053a600, 0xc000214b00, 0xc00046bf20, 0x2c345a0, 0x | |
0, 0x0, 0x0) | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc/server.go:972 +0x470 | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc.(*Server).handleStream(0xc000001500, 0x2183fe0, 0xc00053a600, 0xc000214b00, 0x0) | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc/server.go:1252 +0xda6 | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc.(*Server).serveStreams.func1.1(0xc000464600, 0xc000001500, 0x2183fe0, 0xc00053a600, 0xc000214b00) | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc/server.go:691 +0x9f | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: created by github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc.(*Server).serveStreams.func1 | |
2019-08-04T18:51:22.689-0400 [DEBUG] plugin.terraform-provider-vault_v2.1.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-vault/vendor/google.golang.org/grpc/server.go:689 +0xa1 | |
2019/08/04 18:51:22 [DEBUG] vault_approle_auth_backend_role.staging_grpc_ssl_example: apply errored, but we're indicating that via the Error pointer rather than returning it: rpc error: code = Unavailable desc = transport is closing | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2019/08/04 18:51:22 [TRACE] EvalMaybeTainted: vault_approle_auth_backend_role.staging_grpc_ssl_example encountered an error during creation, so it is now marked as tainted | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 18:51:22 [TRACE] EvalWriteState: removing state object for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners | |
2019/08/04 18:51:22 [TRACE] EvalApplyProvisioners: vault_approle_auth_backend_role.staging_grpc_ssl_example has no state, so skipping provisioners | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2019/08/04 18:51:22 [TRACE] EvalMaybeTainted: vault_approle_auth_backend_role.staging_grpc_ssl_example encountered an error during creation, so it is now marked as tainted | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/08/04 18:51:22 [TRACE] EvalWriteState: removing state object for vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/08/04 18:51:22 [TRACE] <root>: eval: *terraform.EvalApplyPost | |
2019/08/04 18:51:22 [ERROR] <root>: eval: *terraform.EvalApplyPost, err: rpc error: code = Unavailable desc = transport is closing | |
2019/08/04 18:51:22 [ERROR] <root>: eval: *terraform.EvalSequence, err: rpc error: code = Unavailable desc = transport is closing | |
2019/08/04 18:51:22 [TRACE] [walkApply] Exiting eval tree: vault_approle_auth_backend_role.staging_grpc_ssl_example | |
2019/08/04 18:51:22 [TRACE] vertex "vault_approle_auth_backend_role.staging_grpc_ssl_example": visit complete | |
2019-08-04T18:51:22.692-0400 [DEBUG] plugin: plugin process exited: path=/tmp/terraform-working-vault-config/.terraform/plugins/darwin_amd64/terraform-provider-vault_v2.1.0_x4 pid=55671 error="exit status 2" | |
2019/08/04 18:51:22 [TRACE] dag/walk: upstream of "provider.vault (close)" errored, so skipping | |
2019/08/04 18:51:22 [TRACE] dag/walk: upstream of "meta.count-boundary (EachMode fixup)" errored, so skipping | |
2019/08/04 18:51:22 [TRACE] dag/walk: upstream of "root" errored, so skipping | |
2019-08-04T18:51:22.919-0400 [DEBUG] plugin: plugin exited | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! | |
Terraform crashed! This is always indicative of a bug within Terraform. | |
A crash log has been placed at "crash.log" relative to your current | |
working directory. It would be immensely helpful if you could please | |
report the crash with Terraform[1] so that we can fix this. | |
When reporting bugs, please include your terraform version. That | |
information is available on the first line of crash.log. You can also | |
get it by running 'terraform --version' on the command line. | |
[1]: https://github.com/hashicorp/terraform/issues | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment