Created
January 25, 2022 18:18
-
-
Save andresguisado/c9c55902b420d9eab80c1a390584343d to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Running with gitlab-runner 14.7.0~beta.58.gfa48f33b (fa48f33b) | |
on green-1.shared.runners-manager.gitlab.com/default JLgUopmM | |
Preparing the "docker+machine" executor | |
00:08 | |
Using Docker executor with image registry.gitlab.com/gitlab-org/terraform-images/releases/terraform:1.0.3 ... | |
Authenticating with credentials from job payload (GitLab Registry) | |
Pulling docker image registry.gitlab.com/gitlab-org/terraform-images/releases/terraform:1.0.3 ... | |
Using docker image sha256:11c22bfccc890f4912745d868b2de1a1e3a224bdfce5bf90e64386881b014d62 for registry.gitlab.com/gitlab-org/terraform-images/releases/terraform:1.0.3 with digest registry.gitlab.com/gitlab-org/terraform-images/releases/terraform@sha256:414ed3939a58a458fe945ceff9660b65df18b0a00678cd6f0f28b0a4d1563259 ... | |
Preparing environment | |
00:01 | |
Running on runner-jlguopmm-project-31697843-concurrent-0 via runner-jlguopmm-shared-1643133132-39dbe6f9... | |
Getting source from Git repository | |
00:02 | |
$ eval "$CI_PRE_CLONE_SCRIPT" | |
Fetching changes with git depth set to 50... | |
Initialized empty Git repository in /builds/c4188/tfp/.git/ | |
Created fresh repository. | |
Checking out f8bf7dec as main... | |
Skipping Git submodules setup | |
Restoring cache | |
00:01 | |
Checking cache for /builds/c4188/tfp-2... | |
Downloading cache.zip from https://storage.googleapis.com/gitlab-com-runners-cache/project/31697843/builds/c4188/tfp-2 | |
Successfully extracted cache | |
Downloading artifacts | |
00:01 | |
Downloading artifacts for build (2015114508)... | |
Downloading artifacts from coordinator... ok id=2015114508 responseStatus=200 OK token=Ys87zp9X | |
Executing "step_script" stage of the job script | |
00:05 | |
Using docker image sha256:11c22bfccc890f4912745d868b2de1a1e3a224bdfce5bf90e64386881b014d62 for registry.gitlab.com/gitlab-org/terraform-images/releases/terraform:1.0.3 with digest registry.gitlab.com/gitlab-org/terraform-images/releases/terraform@sha256:414ed3939a58a458fe945ceff9660b65df18b0a00678cd6f0f28b0a4d1563259 ... | |
$ cd ${TF_ROOT} | |
$ gitlab-terraform apply | |
Initializing the backend... | |
Successfully configured the backend "http"! Terraform will automatically | |
use this backend unless the backend configuration changes. | |
2022/01/25 17:53:21 [DEBUG] GET https://gitlab.com/api/v4/projects/31697843/terraform/state/aqua-resources-tf | |
Initializing provider plugins... | |
- Finding aquasecurity/aquasec versions matching "0.8.3"... | |
- Installing aquasecurity/aquasec v0.8.3... | |
- Installed aquasecurity/aquasec v0.8.3 (signed by a HashiCorp partner, key ID 4F63A2E2291B077D) | |
Partner and community providers are signed by their developers. | |
If you'd like to know more about provider signing, you can read about it here: | |
https://www.terraform.io/docs/cli/plugins/signing.html | |
Terraform has created a lock file .terraform.lock.hcl to record the provider | |
selections it made above. Include this file in your version control repository | |
so that Terraform can guarantee to make the same selections by default when | |
you run "terraform init" in the future. | |
Terraform has been successfully initialized! | |
2022/01/25 17:53:23 [DEBUG] POST https://gitlab.com/api/v4/projects/31697843/terraform/state/aqua-resources-tf/lock | |
2022/01/25 17:53:23 [DEBUG] GET https://gitlab.com/api/v4/projects/31697843/terraform/state/aqua-resources-tf | |
aquasec_image_assurance_policy.testandres: Modifying... [id=myapp] | |
2022/01/25 17:53:24 [DEBUG] POST https://gitlab.com/api/v4/projects/31697843/terraform/state/aqua-resources-tf?ID=f7787cc2-cae5-b894-ad0f-248662dcaa31 | |
╷ | |
│ Error: Plugin did not respond | |
│ | |
│ with aquasec_image_assurance_policy.testandres, | |
│ on main.tf line 26, in resource "aquasec_image_assurance_policy" "testandres": | |
│ 26: resource "aquasec_image_assurance_policy" "testandres" { | |
│ | |
│ The plugin encountered an error, and failed to respond to the | |
│ plugin.(*GRPCProvider).ApplyResourceChange call. The plugin logs may | |
│ contain more details. | |
╵ | |
2022/01/25 17:53:24 [DEBUG] DELETE https://gitlab.com/api/v4/projects/31697843/terraform/state/aqua-resources-tf/lock | |
Stack trace from the terraform-provider-aquasec_v0.8.3 plugin: | |
panic: interface conversion: interface {} is *schema.Set, not []interface {} | |
goroutine 43 [running]: | |
github.com/aquasecurity/terraform-provider-aquasec/aquasec.expandImageAssurancePolicy(0xc0000ebd80, 0xc0001a92d0) | |
github.com/aquasecurity/terraform-provider-aquasec/aquasec/resource_image_assurance_policy.go:984 +0x4997 | |
github.com/aquasecurity/terraform-provider-aquasec/aquasec.resourceImageAssurancePolicyUpdate(0xc0000ebd80, 0xc9a040, 0xc00048f8c0, 0x0, 0xffffffffffffffff) | |
github.com/aquasecurity/terraform-provider-aquasec/aquasec/resource_image_assurance_policy.go:610 +0x10f | |
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).update(0xc0002b8000, 0xda3b78, 0xc00037a200, 0xc0000ebd80, 0xc9a040, 0xc00048f8c0, 0x0, 0x0, 0x0) | |
github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.2/helper/schema/resource.go:302 +0x88 | |
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*Resource).Apply(0xc0002b8000, 0xda3b78, 0xc00037a200, 0xc0000dad90, 0xc00044fcc0, 0xc9a040, 0xc00048f8c0, 0x0, 0x0, 0x0, ...) | |
github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.2/helper/schema/resource.go:404 +0x390 | |
github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema.(*GRPCProviderServer).ApplyResourceChange(0xc00000d440, 0xda3b78, 0xc00037a200, 0xc00050aa50, 0xc00037a200, 0xc6c840, 0xc00052f700) | |
github.com/hashicorp/terraform-plugin-sdk/v2@v2.4.2/helper/schema/grpc_provider.go:955 +0x8ef | |
github.com/hashicorp/terraform-plugin-go/tfprotov5/server.(*server).ApplyResourceChange(0xc0003341e0, 0xda3c20, 0xc00037a200, 0xc0000da0e0, 0xc0003341e0, 0xc00052f7d0, 0xc000013ba0) | |
github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/server/server.go:332 +0xb5 | |
github.com/hashicorp/terraform-plugin-go/tfprotov5/internal/tfplugin5._Provider_ApplyResourceChange_Handler(0xc6c840, 0xc0003341e0, 0xda3c20, 0xc00052f7d0, 0xc000072720, 0x0, 0xda3c20, 0xc00052f7d0, 0xc000137500, 0x1319) | |
github.com/hashicorp/terraform-plugin-go@v0.2.1/tfprotov5/internal/tfplugin5/tfplugin5_grpc.pb.go:380 +0x214 | |
google.golang.org/grpc.(*Server).processUnaryRPC(0xc0001fce00, 0xdab178, 0xc00056ed80, 0xc00013e000, 0xc000263980, 0x11b1c60, 0x0, 0x0, 0x0) | |
google.golang.org/grpc@v1.32.0/server.go:1194 +0x52b | |
google.golang.org/grpc.(*Server).handleStream(0xc0001fce00, 0xdab178, 0xc00056ed80, 0xc00013e000, 0x0) | |
google.golang.org/grpc@v1.32.0/server.go:1517 +0xd0c | |
google.golang.org/grpc.(*Server).serveStreams.func1.2(0xc0003001b0, 0xc0001fce00, 0xdab178, 0xc00056ed80, 0xc00013e000) | |
google.golang.org/grpc@v1.32.0/server.go:859 +0xab | |
created by google.golang.org/grpc.(*Server).serveStreams.func1 | |
google.golang.org/grpc@v1.32.0/server.go:857 +0x1fd | |
Error: The terraform-provider-aquasec_v0.8.3 plugin crashed! | |
This is always indicative of a bug within the plugin. It would be immensely | |
helpful if you could report the crash with the plugin's maintainers so that it | |
can be fixed. The output above should help diagnose the issue. | |
Cleaning up project directory and file based variables | |
00:01 | |
ERROR: Job failed: exit code 1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment