Created
May 24, 2019 21:49
-
-
Save YakDriver/ff4cafce54728ad25ee1b5119425a3a6 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ terraform apply | |
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
+ create | |
Terraform will perform the following actions: | |
# aws_s3_bucket.encrypted will be created | |
+ resource "aws_s3_bucket" "encrypted" { | |
+ acceleration_status = (known after apply) | |
+ acl = "private" | |
+ arn = (known after apply) | |
+ bucket = "yak-test-2000" | |
+ bucket_domain_name = (known after apply) | |
+ bucket_regional_domain_name = (known after apply) | |
+ force_destroy = false | |
+ hosted_zone_id = (known after apply) | |
+ id = (known after apply) | |
+ region = (known after apply) | |
+ request_payer = (known after apply) | |
+ website_domain = (known after apply) | |
+ website_endpoint = (known after apply) | |
+ server_side_encryption_configuration { | |
+ rule { | |
+ apply_server_side_encryption_by_default {} | |
} | |
} | |
+ versioning { | |
+ enabled = (known after apply) | |
+ mfa_delete = (known after apply) | |
} | |
} | |
Plan: 1 to add, 0 to change, 0 to destroy. | |
Do you want to perform these actions? | |
Terraform will perform the actions described above. | |
Only 'yes' will be accepted to approve. | |
Enter a value: yes | |
aws_s3_bucket.encrypted: Creating... | |
Error: rpc error: code = Unavailable desc = transport is closing | |
panic: interface conversion: interface {} is nil, not map[string]interface {} | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: goroutine 46 [running]: | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsS3BucketServerSideEncryptionConfigurationUpdate(0xc00000f5a8, 0xc000427490, 0x24, 0x1) | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/aws/resource_aws_s3_bucket.go:1784 +0xb1c | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsS3BucketUpdate(0xc000427490, 0x46c8220, 0xc000071400, 0x0, 0xc0008b9880) | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/aws/resource_aws_s3_bucket.go:742 +0x4de | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/aws.resourceAwsS3BucketCreate(0xc000427490, 0x46c8220, 0xc000071400, 0x2, 0x99d77e0) | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/aws/resource_aws_s3_bucket.go:673 +0x7e8 | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema.(*Resource).Apply(0xc000243f00, 0xc0008b62d0, 0xc0008b8800, 0x46c8220, 0xc000071400, 0xc0006ab201, 0xc000bf5ab0, 0x4b92000) | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:286 +0x3b4 | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema.(*Provider).Apply(0xc000614600, 0xc00072fa58, 0xc0008b62d0, 0xc0008b8800, 0xc0006a0aa8, 0xc00000f760, 0x4b94700) | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:285 +0x18f | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/plugin.(*GRPCProviderServer).ApplyResourceChange(0xc0001d0188, 0x5d65960, 0xc0005c73b0, 0xc00009a900, 0xc0001d0188, 0xc0005c73b0, 0xc000878bd0) | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/helper/plugin/grpc_provider.go:842 +0x894 | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/internal/tfplugin5._Provider_ApplyResourceChange_Handler(0x540dbe0, 0xc0001d0188, 0x5d65960, 0xc0005c73b0, 0xc0008b6000, 0x0, 0x5d65960, 0xc0005c73b0, 0xc0009d8000, 0x3ed) | |
2019-05-24T17:44:06.085-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/github.com/hashicorp/terraform/internal/tfplugin5/tfplugin5.pb.go:3019 +0x23e | |
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc.(*Server).processUnaryRPC(0xc00009d380, 0x5d85d40, 0xc00009de00, 0xc0007c0200, 0xc0005c7710, 0x99aa8a0, 0x0, 0x0, 0x0) | |
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc/server.go:966 +0x470 | |
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc.(*Server).handleStream(0xc00009d380, 0x5d85d40, 0xc00009de00, 0xc0007c0200, 0x0) | |
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc/server.go:1245 +0xd25 | |
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc.(*Server).serveStreams.func1.1(0xc000130020, 0xc00009d380, 0x5d85d40, 0xc00009de00, 0xc0007c0200) | |
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc/server.go:685 +0x9f | |
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: created by github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc.(*Server).serveStreams.func1 | |
2019-05-24T17:44:06.086-0400 [DEBUG] plugin.terraform-provider-aws_v2.12.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-aws/vendor/google.golang.org/grpc/server.go:683 +0xa1 | |
2019-05-24T17:44:06.089-0400 [DEBUG] plugin: plugin process exited: path=/Users/maviemarcos/dev/fardvag/s3_encrypt_crash/.terraform/plugins/darwin_amd64/terraform-provider-aws_v2.12.0_x4 pid=22703 error="exit status 2" | |
2019/05/24 17:44:06 [DEBUG] aws_s3_bucket.encrypted: apply errored, but we're indicating that via the Error pointer rather than returning it: rpc error: code = Unavailable desc = transport is closing | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2019/05/24 17:44:06 [TRACE] EvalMaybeTainted: aws_s3_bucket.encrypted encountered an error during creation, so it is now marked as tainted | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/05/24 17:44:06 [TRACE] EvalWriteState: removing state object for aws_s3_bucket.encrypted | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalApplyProvisioners | |
2019/05/24 17:44:06 [TRACE] EvalApplyProvisioners: aws_s3_bucket.encrypted has no state, so skipping provisioners | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalMaybeTainted | |
2019/05/24 17:44:06 [TRACE] EvalMaybeTainted: aws_s3_bucket.encrypted encountered an error during creation, so it is now marked as tainted | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalWriteState | |
2019/05/24 17:44:06 [TRACE] EvalWriteState: removing state object for aws_s3_bucket.encrypted | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalIf | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalWriteDiff | |
2019/05/24 17:44:06 [TRACE] <root>: eval: *terraform.EvalApplyPost | |
2019/05/24 17:44:06 [ERROR] <root>: eval: *terraform.EvalApplyPost, err: rpc error: code = Unavailable desc = transport is closing | |
2019/05/24 17:44:06 [ERROR] <root>: eval: *terraform.EvalSequence, err: rpc error: code = Unavailable desc = transport is closing | |
2019/05/24 17:44:06 [TRACE] [walkApply] Exiting eval tree: aws_s3_bucket.encrypted | |
2019/05/24 17:44:06 [TRACE] vertex "aws_s3_bucket.encrypted": visit complete | |
2019/05/24 17:44:06 [TRACE] dag/walk: upstream of "provider.aws (close)" errored, so skipping | |
2019/05/24 17:44:06 [TRACE] dag/walk: upstream of "meta.count-boundary (EachMode fixup)" errored, so skipping | |
2019/05/24 17:44:06 [TRACE] dag/walk: upstream of "root" errored, so skipping | |
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: reading latest snapshot from terraform.tfstate | |
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: snapshot file has nil snapshot, but that's okay | |
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: read nil snapshot | |
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: no original state snapshot to back up | |
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: state has changed since last snapshot, so incrementing serial to 1 | |
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: writing snapshot at terraform.tfstate | |
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: removing lock metadata file .terraform.tfstate.lock.info | |
2019/05/24 17:44:06 [TRACE] statemgr.Filesystem: unlocking terraform.tfstate using fcntl flock | |
2019-05-24T17:44:06.255-0400 [DEBUG] plugin: plugin exited | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! | |
Terraform crashed! This is always indicative of a bug within Terraform. | |
A crash log has been placed at "crash.log" relative to your current | |
working directory. It would be immensely helpful if you could please | |
report the crash with Terraform[1] so that we can fix this. | |
When reporting bugs, please include your terraform version. That | |
information is available on the first line of crash.log. You can also | |
get it by running 'terraform --version' on the command line. | |
[1]: https://github.com/hashicorp/terraform/issues | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment