Skip to content

Instantly share code, notes, and snippets.

@psteinroe
Created May 7, 2021 06:35
Show Gist options
  • Save psteinroe/4023c4a3dfb89d6a45236c029dce74f0 to your computer and use it in GitHub Desktop.
Save psteinroe/4023c4a3dfb89d6a45236c029dce74f0 to your computer and use it in GitHub Desktop.
tf panic error
Terraform v0.15.2
on linux_amd64
Configuring remote state backend...
Initializing Terraform configuration...
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# google_container_cluster.main will be created
+ resource "google_container_cluster" "main" {
+ cluster_ipv4_cidr = (known after apply)
+ datapath_provider = (known after apply)
+ default_max_pods_per_node = (known after apply)
+ enable_binary_authorization = false
+ enable_intranode_visibility = (known after apply)
+ enable_kubernetes_alpha = false
+ enable_legacy_abac = false
+ enable_shielded_nodes = (known after apply)
+ endpoint = (known after apply)
+ id = (known after apply)
+ instance_group_urls = (known after apply)
+ label_fingerprint = (known after apply)
+ location = (known after apply)
+ logging_service = (known after apply)
+ master_version = (known after apply)
+ monitoring_service = (known after apply)
+ name = "main"
+ network = "default"
+ networking_mode = (known after apply)
+ node_locations = (known after apply)
+ node_version = (known after apply)
+ operation = (known after apply)
+ private_ipv6_google_access = (known after apply)
+ project = (known after apply)
+ self_link = (known after apply)
+ services_ipv4_cidr = (known after apply)
+ subnetwork = (known after apply)
+ tpu_ipv4_cidr_block = (known after apply)
+ addons_config {
+ cloudrun_config {
+ disabled = (known after apply)
+ load_balancer_type = (known after apply)
}
+ horizontal_pod_autoscaling {
+ disabled = (known after apply)
}
+ http_load_balancing {
+ disabled = (known after apply)
}
+ network_policy_config {
+ disabled = (known after apply)
}
}
+ authenticator_groups_config {
+ security_group = (known after apply)
}
+ cluster_autoscaling {
+ enabled = (known after apply)
+ auto_provisioning_defaults {
+ oauth_scopes = (known after apply)
+ service_account = (known after apply)
}
+ resource_limits {
+ maximum = (known after apply)
+ minimum = (known after apply)
+ resource_type = (known after apply)
}
}
+ database_encryption {
+ key_name = (known after apply)
+ state = (known after apply)
}
+ default_snat_status {
+ disabled = (known after apply)
}
+ ip_allocation_policy {
+ cluster_ipv4_cidr_block = (known after apply)
+ cluster_secondary_range_name = (known after apply)
+ services_ipv4_cidr_block = (known after apply)
+ services_secondary_range_name = (known after apply)
}
+ master_auth {
+ client_certificate = (known after apply)
+ client_key = (sensitive value)
+ cluster_ca_certificate = (known after apply)
+ password = (sensitive value)
+ username = (known after apply)
+ client_certificate_config {
+ issue_client_certificate = (known after apply)
}
}
+ network_policy {
+ enabled = (known after apply)
+ provider = (known after apply)
}
+ node_config {
+ disk_size_gb = (known after apply)
+ disk_type = (known after apply)
+ guest_accelerator = (known after apply)
+ image_type = (known after apply)
+ labels = (known after apply)
+ local_ssd_count = (known after apply)
+ machine_type = (known after apply)
+ metadata = (known after apply)
+ min_cpu_platform = (known after apply)
+ oauth_scopes = (known after apply)
+ preemptible = (known after apply)
+ service_account = (known after apply)
+ tags = (known after apply)
+ taint = (known after apply)
+ shielded_instance_config {
+ enable_integrity_monitoring = (known after apply)
+ enable_secure_boot = (known after apply)
}
+ workload_metadata_config {
+ node_metadata = (known after apply)
}
}
+ node_pool {
+ initial_node_count = (known after apply)
+ instance_group_urls = (known after apply)
+ max_pods_per_node = (known after apply)
+ name = (known after apply)
+ name_prefix = (known after apply)
+ node_count = (known after apply)
+ node_locations = (known after apply)
+ version = (known after apply)
+ autoscaling {
+ max_node_count = (known after apply)
+ min_node_count = (known after apply)
}
+ management {
+ auto_repair = (known after apply)
+ auto_upgrade = (known after apply)
}
+ node_config {
+ disk_size_gb = (known after apply)
+ disk_type = (known after apply)
+ guest_accelerator = (known after apply)
+ image_type = (known after apply)
+ labels = (known after apply)
+ local_ssd_count = (known after apply)
+ machine_type = (known after apply)
+ metadata = (known after apply)
+ min_cpu_platform = (known after apply)
+ oauth_scopes = (known after apply)
+ preemptible = (known after apply)
+ service_account = (known after apply)
+ tags = (known after apply)
+ taint = (known after apply)
+ shielded_instance_config {
+ enable_integrity_monitoring = (known after apply)
+ enable_secure_boot = (known after apply)
}
+ workload_metadata_config {
+ node_metadata = (known after apply)
}
}
+ upgrade_settings {
+ max_surge = (known after apply)
+ max_unavailable = (known after apply)
}
}
+ release_channel {
+ channel = (known after apply)
}
+ workload_identity_config {
+ identity_namespace = (known after apply)
}
}
Plan: 1 to add, 0 to change, 0 to destroy.
Failed running command "cd '/terraform' && envdir /env terraform show -json /terraform/terraform.tfplan" (exit 2)
Output: panic: interface conversion: interface {} is nil, not map[string]interface {}
goroutine 1 [running]:
github.com/zclconf/go-cty/cty.Value.GetAttr(0x2c6b4b0, 0xc000bc3bb0, 0x0, 0x0, 0xc00062ce30, 0xb, 0x0, 0xc000ba2e58, 0x241c240, 0xc000ba2de8)
/go/pkg/mod/github.com/zclconf/go-cty@v1.8.3/cty/value_ops.go:760 +0x416
github.com/hashicorp/terraform/configs/configschema.(*Block).ValueMarks(0xc00092e4b0, 0x2c6b4b0, 0xc000bc3bb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, ...)
/home/circleci/project/project/configs/configschema/marks.go:33 +0x545
github.com/hashicorp/terraform/command/jsonplan.(*plan).marshalResourceChanges(0xc0007389c0, 0xc000bac780, 0xc000906e90, 0x0, 0x0)
/home/circleci/project/project/command/jsonplan/plan.go:218 +0x1825
github.com/hashicorp/terraform/command/jsonplan.Marshal(0xc0009ed790, 0xc0014ee630, 0xc000bacf90, 0xc000906e90, 0x0, 0x0, 0x0, 0x0, 0x0)
/home/circleci/project/project/command/jsonplan/plan.go:124 +0x23f
github.com/hashicorp/terraform/command.(*ShowCommand).Run(0xc000690000, 0xc00004c0b0, 0x1, 0x2, 0xc0005e66d0)
/home/circleci/project/project/command/show.go:152 +0x966
github.com/mitchellh/cli.(*CLI).Run(0xc0005ce3c0, 0xc000684450, 0x27e9055, 0x4)
/go/pkg/mod/github.com/mitchellh/cli@v1.1.2/cli.go:262 +0x41a
main.wrappedMain(0x0)
/home/circleci/project/project/main.go:384 +0x1112
main.realMain(0x0)
/home/circleci/project/project/main.go:115 +0x554
main.main()
/home/circleci/project/project/main.go:58 +0x25
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Terraform crashed! This is always indicative of a bug within Terraform.
A crash log has been placed at "crash.544339745.log" relative to your current
working directory. It would be immensely helpful if you could please
report the crash with Terraform[1] so that we can fix this.
When reporting bugs, please include your terraform version. That
information is available on the first line of crash.log. You can also
get it by running 'terraform --version' on the command line.
SECURITY WARNING: the "crash.544339745.log" file that was created may contain
sensitive information that must be redacted before it is safe to share
on the issue tracker.
[1]: https://github.com/hashicorp/terraform/issues
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment