Created
September 5, 2024 20:42
-
-
Save chinchalinchin/75c24affbaa3e93e4d0cb3b6452b8b6e to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
terraform init | |
2024-09-05T16:16:13.333-0400 [INFO] Terraform version: 1.8.5 | |
2024-09-05T16:16:13.333-0400 [DEBUG] using github.com/hashicorp/go-tfe v1.51.0 | |
2024-09-05T16:16:13.333-0400 [DEBUG] using github.com/hashicorp/hcl/v2 v2.20.0 | |
2024-09-05T16:16:13.333-0400 [DEBUG] using github.com/hashicorp/terraform-svchost v0.1.1 | |
2024-09-05T16:16:13.333-0400 [DEBUG] using github.com/zclconf/go-cty v1.14.3 | |
2024-09-05T16:16:13.333-0400 [INFO] Go runtime version: go1.22.1 | |
2024-09-05T16:16:13.333-0400 [INFO] CLI args: []string{"terraform", "init"} | |
2024-09-05T16:16:13.333-0400 [TRACE] Stdout is a terminal of width 192 | |
2024-09-05T16:16:13.333-0400 [TRACE] Stderr is a terminal of width 192 | |
2024-09-05T16:16:13.333-0400 [TRACE] Stdin is a terminal | |
2024-09-05T16:16:13.333-0400 [DEBUG] Attempting to open CLI config file: /home/<user>/.terraformrc | |
2024-09-05T16:16:13.333-0400 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. | |
2024-09-05T16:16:13.333-0400 [DEBUG] ignoring non-existing provider search directory terraform.d/plugins | |
2024-09-05T16:16:13.333-0400 [DEBUG] ignoring non-existing provider search directory /home/<user>/.terraform.d/plugins | |
2024-09-05T16:16:13.333-0400 [DEBUG] ignoring non-existing provider search directory /home/<user>/.local/share/terraform/plugins | |
2024-09-05T16:16:13.333-0400 [DEBUG] ignoring non-existing provider search directory /usr/local/share/terraform/plugins | |
2024-09-05T16:16:13.333-0400 [DEBUG] ignoring non-existing provider search directory /usr/share/terraform/plugins | |
2024-09-05T16:16:13.336-0400 [INFO] CLI command args: []string{"init"} | |
Initializing the backend... | |
2024-09-05T16:16:13.338-0400 [TRACE] Meta.Backend: built configuration for "s3" backend with hash value 1283479399 | |
2024-09-05T16:16:13.338-0400 [TRACE] Meta.Backend: backend has not previously been initialized in this working directory | |
2024-09-05T16:16:13.338-0400 [DEBUG] New state was assigned lineage "a0a07c01-77e8-6fbf-4635-b2372ff9d548" | |
2024-09-05T16:16:13.338-0400 [TRACE] Meta.Backend: moving from default local state only to "s3" backend | |
2024-09-05T16:16:13.338-0400 [DEBUG] checking for provisioner in "." | |
2024-09-05T16:16:13.340-0400 [DEBUG] checking for provisioner in "/usr/local/bin" | |
2024-09-05T16:16:13.340-0400 [TRACE] backend/local: state manager for workspace "default" will: | |
- read initial snapshot from terraform.tfstate | |
- write new snapshots to terraform.tfstate | |
- create any backup at terraform.tfstate.backup | |
2024-09-05T16:16:13.340-0400 [TRACE] statemgr.Filesystem: reading initial snapshot from terraform.tfstate | |
2024-09-05T16:16:13.340-0400 [TRACE] statemgr.Filesystem: snapshot file has nil snapshot, but that's okay | |
2024-09-05T16:16:13.340-0400 [TRACE] statemgr.Filesystem: read nil snapshot | |
2024-09-05T16:16:13.340-0400 [TRACE] Meta.Backend: ignoring local "default" workspace because its state is empty | |
2024-09-05T16:16:13.340-0400 [TRACE] backend-s3.aws-base: Resolving AWS configuration: tf_backend.operation=Configure tf_backend.req_id=7a554751-99fb-d31d-e8da-bd3c3f93fa24 tf_backend.s3.bucket=<state-bucket> tf_backend.s3.path=<state-path>/state.tfstate | |
2024-09-05T16:16:13.340-0400 [DEBUG] backend-s3.aws-base: Resolving credentials provider: tf_backend.operation=Configure tf_backend.req_id=7a554751-99fb-d31d-e8da-bd3c3f93fa24 tf_backend.s3.bucket=<state-bucket> tf_backend.s3.path=<state-path>/state.tfstate | |
2024-09-05T16:16:13.340-0400 [TRACE] backend-s3.aws-base: Building default HTTP client: tf_backend.operation=Configure tf_backend.req_id=7a554751-99fb-d31d-e8da-bd3c3f93fa24 tf_backend.s3.bucket=<state-bucket> tf_backend.s3.path=<state-path>/state.tfstate | |
2024-09-05T16:16:13.340-0400 [DEBUG] backend-s3.aws-base: Loading configuration: tf_backend.operation=Configure tf_backend.req_id=7a554751-99fb-d31d-e8da-bd3c3f93fa24 tf_backend.s3.bucket=<state-bucket> tf_backend.s3.path=<state-path>/state.tfstate | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! | |
Terraform crashed! This is always indicative of a bug within Terraform. | |
Please report the crash with Terraform[1] so that we can fix this. | |
When reporting bugs, please include your terraform version, the stack trace | |
shown below, and any additional information which may help replicate the issue. | |
[1]: https://github.com/hashicorp/terraform/issues | |
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!! | |
panic: runtime error: slice bounds out of range [1:0] | |
goroutine 1 [running]: | |
runtime/debug.Stack() | |
runtime/debug/stack.go:24 +0x5e | |
github.com/hashicorp/terraform/internal/logging.PanicHandler() | |
github.com/hashicorp/terraform/internal/logging/panic.go:84 +0x18b | |
panic({0x32ae740?, 0xc0007c8df8?}) | |
runtime/panic.go:770 +0x132 | |
github.com/aws/aws-sdk-go-v2/internal/ini.unquote({0xc000078832, 0x1}) | |
github.com/aws/aws-sdk-go-v2/internal/[email protected]/strings.go:63 +0xf9 | |
github.com/aws/aws-sdk-go-v2/internal/ini.legacyStrconv(...) | |
github.com/aws/aws-sdk-go-v2/internal/[email protected]/strings.go:71 | |
github.com/aws/aws-sdk-go-v2/internal/ini.asProperty({0xc00007881a?, 0xc0007174d0?}) | |
github.com/aws/aws-sdk-go-v2/internal/[email protected]/tokenize.go:60 +0x91 | |
github.com/aws/aws-sdk-go-v2/internal/ini.tokenize({0xc0007174d0, 0x3, 0x3d3ec40?}) | |
github.com/aws/aws-sdk-go-v2/internal/[email protected]/tokenize.go:16 +0x199 | |
github.com/aws/aws-sdk-go-v2/internal/ini.Parse({0x3d4efa0?, 0xc0007cc500?}, {0xc000779e90, 0x22}) | |
github.com/aws/aws-sdk-go-v2/internal/[email protected]/ini.go:50 +0xc5 | |
github.com/aws/aws-sdk-go-v2/internal/ini.OpenFile({0xc000779e90, 0x22}) | |
github.com/aws/aws-sdk-go-v2/internal/[email protected]/ini.go:39 +0x119 | |
github.com/aws/aws-sdk-go-v2/config.loadIniFiles({0x5824590, 0x1, 0xc00089a938?}) | |
github.com/aws/aws-sdk-go-v2/[email protected]/shared_config.go:772 +0x85 | |
github.com/aws/aws-sdk-go-v2/config.LoadSharedConfigProfile({_, _}, {_, _}, {_, _, _}) | |
github.com/aws/aws-sdk-go-v2/[email protected]/shared_config.go:656 +0x1b4 | |
github.com/aws/aws-sdk-go-v2/config.loadSharedConfig({0x3d8bbf8, 0xc000717230}, {0xc0008d3240, 0x2, 0x2}) | |
github.com/aws/aws-sdk-go-v2/[email protected]/shared_config.go:593 +0x391 | |
github.com/aws/aws-sdk-go-v2/config.loadSharedConfigIgnoreNotExist({0x3d8bbf8?, 0xc000717230?}, {0xc0008d3240?, 0xc00089b698?, 0x2f93300?}) | |
github.com/aws/aws-sdk-go-v2/[email protected]/shared_config.go:529 +0x3a | |
github.com/aws/aws-sdk-go-v2/config.configs.AppendFromLoaders({0xc0004a55f0?, 0xc000075000?, 0x0?}, {0x3d8bbf8, 0xc000717230}, {0xc0004a5600, 0x2, 0x34dada6?}) | |
github.com/aws/aws-sdk-go-v2/[email protected]/config.go:126 +0xb6 | |
github.com/aws/aws-sdk-go-v2/config.LoadDefaultConfig({_, _}, {_, _, _}) | |
github.com/aws/aws-sdk-go-v2/[email protected]/config.go:194 +0x173 | |
github.com/hashicorp/aws-sdk-go-base/v2.getCredentialsProvider({0x3d8bbf8, 0xc000717230}, 0xc000074c00) | |
github.com/hashicorp/aws-sdk-go-base/[email protected]/credentials.go:78 +0x8c5 | |
github.com/hashicorp/aws-sdk-go-base/v2.GetAwsConfig({_, _}, _) | |
github.com/hashicorp/aws-sdk-go-base/[email protected]/aws_config.go:113 +0x94f | |
github.com/hashicorp/terraform/internal/backend/remote-state/s3.(*Backend).Configure(0xc00001b2c0, {{{0x3d8c210?, 0xc0004a4f30?}}, {0x2f48c40?, 0xc000716db0?}}) | |
github.com/hashicorp/terraform/internal/backend/remote-state/s3/backend.go:1203 +0x404b | |
github.com/hashicorp/terraform/internal/command.(*Meta).backendInitFromConfig(0xc000391500, 0xc0004295e0) | |
github.com/hashicorp/terraform/internal/command/meta_backend.go:1432 +0x7b9 | |
github.com/hashicorp/terraform/internal/command.(*Meta).backend_C_r_s(0xc000391500, 0xc0004295e0, 0x4c805767, 0xc0005a51a0, 0xc00089ede8) | |
github.com/hashicorp/terraform/internal/command/meta_backend.go:1000 +0x979 | |
github.com/hashicorp/terraform/internal/command.(*Meta).backendFromConfig(0xc000391500, 0xc00089ede8) | |
github.com/hashicorp/terraform/internal/command/meta_backend.go:649 +0x17a5 | |
github.com/hashicorp/terraform/internal/command.(*Meta).Backend(0xc000391500, 0x0?) | |
github.com/hashicorp/terraform/internal/command/meta_backend.go:105 +0x6a | |
github.com/hashicorp/terraform/internal/command.(*InitCommand).initBackend(0xc000391500, {0x3d8bc30?, 0xc00082a140?}, 0xc00034a690, {{0x34c829b?, 0x34c52af?}, 0xc0007a1938?}) | |
github.com/hashicorp/terraform/internal/command/init.go:507 +0x91f | |
github.com/hashicorp/terraform/internal/command.(*InitCommand).Run(0xc000391500, {0xc000130010, 0x0, 0x0}) | |
github.com/hashicorp/terraform/internal/command/init.go:201 +0x137e | |
github.com/hashicorp/cli.(*CLI).Run(0xc000650140) | |
github.com/hashicorp/[email protected]/cli.go:265 +0x5b8 | |
main.realMain() | |
github.com/hashicorp/terraform/main.go:339 +0x1e6b | |
main.main() | |
github.com/hashicorp/terraform/main.go:64 +0x13 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment