Skip to content

Instantly share code, notes, and snippets.

@YakDriver
Created May 24, 2019 21:49
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save YakDriver/ff4cafce54728ad25ee1b5119425a3a6 to your computer and use it in GitHub Desktop.
Save YakDriver/ff4cafce54728ad25ee1b5119425a3a6 to your computer and use it in GitHub Desktop.
$ terraform apply
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# aws_s3_bucket.encrypted will be created
+ resource "aws_s3_bucket" "encrypted" {
+ acceleration_status = (known after apply)
+ acl = "private"
+ arn = (known after apply)
+ bucket = "yak-test-2000"
+ bucket_domain_name = (known after apply)
+ bucket_regional_domain_name = (known after apply)
+ force_destroy = false
+ hosted_zone_id = (known after apply)
+ id = (known after apply)
+ region = (known after apply)
+ request_payer = (known after apply)
+ website_domain = (known after apply)
+ website_endpoint = (known after apply)
+ server_side_encryption_configuration {
+ rule {
+ apply_server_side_encryption_by_default {}
}
}
+ versioning {
+ enabled = (known after apply)
+ mfa_delete = (known after apply)
}
}
Plan: 1 to add, 0 to change, 0 to destroy.
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
aws_s3_bucket.encrypted: Creating...
Error: rpc error: code = Unavailable desc = transport is closing
panic: interface conversion: interface {} is nil, not map[string]interface {}
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4:
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: goroutine 46 [running]:
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsS3BucketServerSideEncryptionConfigurationUpdate(0xc00000f5a8, 0xc000427490, 0x24, 0x1)
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/aws/resource_aws_s3_bucket.go:1784 +0xb1c
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsS3BucketUpdate(0xc000427490, 0x46c8220, 0xc000071400, 0x0, 0xc0008b9880)
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/aws/resource_aws_s3_bucket.go:742 +0x4de
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsS3BucketCreate(0xc000427490, 0x46c8220, 0xc000071400, 0x2, 0x99d77e0)
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/aws/resource_aws_s3_bucket.go:673 +0x7e8
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Apply(0xc000243f00, 0xc0008b62d0, 0xc0008b8800, 0x46c8220, 0xc000071400, 0xc0006ab201, 0xc000bf5ab0, 0x4b92000)
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:286 +0x3b4
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Apply(0xc000614600, 0xc00072fa58, 0xc0008b62d0, 0xc0008b8800, 0xc0006a0aa8, 0xc00000f760, 0x4b94700)
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:285 +0x18f
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/plugin.(*GRPCProviderServer).ApplyResourceChange(0xc0001d0188, 0x5d65960, 0xc0005c73b0, 0xc00009a900, 0xc0001d0188, 0xc0005c73b0, 0xc000878bd0)
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/plugin/grpc_provider.go:842 +0x894
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/internal/tfplugin5._Provider_ApplyResourceChange_Handler(0x540dbe0, 0xc0001d0188, 0x5d65960, 0xc0005c73b0, 0xc0008b6000, 0x0, 0x5d65960, 0xc0005c73b0, 0xc0009d8000, 0x3ed)
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/internal/tfplugin5/tfplugin5.pb.go:3019 +0x23e
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc.(*Server).processUnaryRPC(0xc00009d380, 0x5d85d40, 0xc00009de00, 0xc0007c0200, 0xc0005c7710, 0x99aa8a0, 0x0, 0x0, 0x0)
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc/server.go:966 +0x470
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc.(*Server).handleStream(0xc00009d380, 0x5d85d40, 0xc00009de00, 0xc0007c0200, 0x0)
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc/server.go:1245 +0xd25
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc.(*Server).serveStreams.func1.1(0xc000130020, 0xc00009d380, 0x5d85d40, 0xc00009de00, 0xc0007c0200)
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc/server.go:685 +0x9f
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: created by github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc.(*Server).serveStreams.func1
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc/server.go:683 +0xa1
2019-05-24T17:44:06.089-0400 [DEBUG] plugin: plugin process exited: path=/Users/maviemarcos/dev/fardvag/s3_encrypt_crash/.terraform/plugins/darwin_amd64/terraform-provider-aws_v2.12.0_x4 pid=22703 error="exit status 2"
2019/05/24 17:44:06 [DEBUG] aws_s3_bucket.encrypted: apply errored, but we're indicating that via the Error pointer rather than returning it: rpc error: code = Unavailable desc = transport is closing
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalMaybeTainted
2019/05/24 17:44:06 [TRACE] EvalMaybeTainted: aws_s3_bucket.encrypted encountered an error during creation, so it is now marked as tainted
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalWriteState
2019/05/24 17:44:06 [TRACE] EvalWriteState: removing state object for aws_s3_bucket.encrypted
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners
2019/05/24 17:44:06 [TRACE] EvalApplyProvisioners: aws_s3_bucket.encrypted has no state, so skipping provisioners
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalMaybeTainted
2019/05/24 17:44:06 [TRACE] EvalMaybeTainted: aws_s3_bucket.encrypted encountered an error during creation, so it is now marked as tainted
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalWriteState
2019/05/24 17:44:06 [TRACE] EvalWriteState: removing state object for aws_s3_bucket.encrypted
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalIf
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalIf
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalWriteDiff
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalApplyPost
2019/05/24 17:44:06 [ERROR] <root>: eval: *terraform.EvalApplyPost, err: rpc error: code = Unavailable desc = transport is closing
2019/05/24 17:44:06 [ERROR] <root>: eval: *terraform.EvalSequence, err: rpc error: code = Unavailable desc = transport is closing
2019/05/24 17:44:06 [TRACE] [walkApply] Exiting eval tree: aws_s3_bucket.encrypted
2019/05/24 17:44:06 [TRACE] vertex "aws_s3_bucket.encrypted": visit complete
2019/05/24 17:44:06 [TRACE] dag/walk: upstream of "provider.aws (close)" errored, so skipping
2019/05/24 17:44:06 [TRACE] dag/walk: upstream of "meta.count-boundary (EachMode fixup)" errored, so skipping
2019/05/24 17:44:06 [TRACE] dag/walk: upstream of "root" errored, so skipping
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: snapshot file has nil snapshot, but that's okay
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: read nil snapshot
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: no original state snapshot to back up
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 1
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: removing lock metadata file .terraform.tfstate.lock.info
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: unlocking terraform.tfstate using fcntl flock
2019-05-24T17:44:06.255-0400 [DEBUG] plugin: plugin exited
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Terraform crashed! This is always indicative of a bug within Terraform.
A crash log has been placed at "crash.log" relative to your current
working directory. It would be immensely helpful if you could please
report the crash with Terraform[1] so that we can fix this.
When reporting bugs, please include your terraform version. That
information is available on the first line of crash.log. You can also
get it by running 'terraform --version' on the command line.
[1]: https://github.com/hashicorp/terraform/issues
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment