Closed swastik7853 closed 1 year ago
Hi @swastik7853,
The crash you see here is from the google provider, so perhaps something you changed related to a google resource might lead to a workaround. Unfortunately the versions of Terraform and providers you are using are extremely old (the Google provider for example is from 2018), so there is not going to be any way to fix the issue other than to begin the upgrade process. I would urge you to work on upgrading as soon as possible, since it only gets more difficult as the world around the old releases moves on and support for the old versions continues to wain.
Thanks!
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Terraform Version
Terraform Configuration Files
cat variables.tf variable "project" { type = "string" }
variable "env_name" { type = "string" }
variable "region" { type = "string" }
variable "buckets_location" { type = "string" default = "US" }
variable "global_lb" { description = "Use global load balancers for CF instead regional load balancers" default = 1 }
variable "infrastructure_cidr" { type = "string" description = "cidr for infrastructure subnet" default = "10.0.0.0/26" }
variable "pas_cidr" { type = "string" description = "cidr for pas subnet" default = "10.0.4.0/24" }
variable "services_cidr" { type = "string" description = "cidr for services subnet" default = "10.0.8.0/24" }
variable "zones" { type = "list" }
variable "opsman_image_url" { type = "string" description = "Location of ops manager image on google cloud storage" }
variable "optional_opsman_image_url" { type = "string" description = "Location of ops manager image (to be used for optional extra instance) on google cloud storage" default = "" }
variable "opsman_machine_type" { type = "string" default = "n1-standard-2" }
variable "service_account_key" { type = "string" }
variable "dns_suffix" { type = "string" description = "Domain to add environment subdomain to (e.g. foo.example.com). Trailing dots are not supported." }
variable "ssl_cert" { type = "string" description = "The contents of an SSL certificate to be used by the LB, optional if
ssl_ca_cert
is provided" default = "" }variable "ssl_private_key" { type = "string" description = "The contents of an SSL private key to be used by the LB, optional if
ssl_ca_cert
is provided" default = "" }variable "ssl_ca_cert" { type = "string" description = "The contents of a CA public key to be used to sign the generated LB certificate, optional if
ssl_cert
is provided" default = "" }variable "ssl_ca_private_key" { type = "string" description = "the contents of a CA private key to be used to sign the generated LB certificate, optional if
ssl_cert
is provided" default = "" }variable "create_iam_service_account_members" { description = "If set to true, create an IAM Service Account project roles" default = true }
variable "external_database" { description = "Stands up a cloud SQL database instance for the Ops Manager and PAS" default = false }
variable "internetless" { description = "When set to true, all traffic going outside the 10.* network is denied." default = false }
///** // OpsMan Options // **/
variable "opsman_storage_bucket_count" { type = "string" description = "Optional configuration of a Google Storage Bucket for BOSH's blobstore" default = "0" }
variable "pas_sql_db_host" { type = "string" description = "The host the user can connect from." default = "" }
variable "opsman_sql_db_host" { type = "string" description = "The host the user can connect from." default = "" }
/*****
variable "isolation_segment" { description = "create the required infrastructure to deploy isolation segment" default = false }
variable "iso_seg_with_firewalls" { description = "create firewalls to lock down ports on the isolation segment" default = false }
variable "iso_seg_ssl_cert" { type = "string" description = "the contents of an SSL certificate to be used by the LB, optional if
iso_seg_ssl_ca_cert
is provided" default = "" }variable "iso_seg_ssl_private_key" { type = "string" description = "The contents of an SSL private key to be used by the LB, optional if
iso_seg_ssl_ca_cert
is provided" default = "" }variable "iso_seg_ssl_ca_cert" { type = "string" description = "The contents of a CA public key to be used to sign the generated iso seg LB certificate, optional if
iso_seg_ssl_cert
is provided" default = "" }variable "iso_seg_ssl_ca_private_key" { type = "string" description = "The contents of a CA private key to be used to sign the generated iso seg LB certificate, optional if
iso_seg_ssl_cert
is provided" default = "" }variable "iso_seg_replicated_suffix" { type = "string" description = "If you are using the tile
replicator
CLI, set this variable to match the replicated suffix. Will be used to set networking firewall rules." default = "-replicated" }/*****
variable "create_gcs_buckets" { description = "Create Google Storage Buckets for Elastic Runtime Cloud Controller's file storage" default = true }
variable "create_blobstore_service_account_key" { description = "Create a scoped service account key for gcs storage access" default = true }
/***
variable "jumpbox_init_script" { description = "Path to the script for initiliazing the jumpbox vm." default = "" }
cat main.tf provider "google" { project = "${var.project}" region = "${var.region}" credentials = "${var.service_account_key}"
version = "~> 1.20" }
terraform { required_version = "< 0.12.0" }
module "infra" { source = "../modules/infra"
project = "${var.project}" env_name = "${var.env_name}" region = "${var.region}" infrastructure_cidr = "${var.infrastructure_cidr}" internetless = "${var.internetless}" create_blobstore_service_account_key = "${var.create_blobstore_service_account_key}" internal_access_source_ranges = ["${var.pas_cidr}", "${var.services_cidr}"] root_domain = "${var.env_name}.${var.dns_suffix}" }
module "ops_manager" { source = "../modules/ops_manager"
project = "${var.project}" env_name = "${var.env_name}" zones = "${var.zones}"
opsman_storage_bucket_count = "${var.opsman_storage_bucket_count}"
opsman_machine_type = "${var.opsman_machine_type}" opsman_image_url = "${var.opsman_image_url}" optional_opsman_image_url = "${var.optional_opsman_image_url}" create_iam_service_account_members = "${var.create_iam_service_account_members}"
pcf_network_name = "${module.infra.network}" subnet = "${module.infra.subnet}"
dns_zone_name = "${module.infra.dns_zone_name}" dns_zone_dns_name = "${module.infra.dns_zone_dns_name}"
external_database = "${var.external_database}" sql_instance = "${module.external_database.sql_instance}" opsman_sql_db_host = "${var.opsman_sql_db_host}" }
module "pas_certs" { source = "../modules/certs"
subdomains = [".apps", ".sys", ".login.sys", ".uaa.sys"] env_name = "${var.env_name}" dns_suffix = "${var.dns_suffix}" resource_name = "pas-lbcert"
ssl_cert = "${var.ssl_cert}" ssl_private_key = "${var.ssl_private_key}" ssl_ca_cert = "${var.ssl_ca_cert}" ssl_ca_private_key = "${var.ssl_ca_private_key}" }
module "pas" { source = "../modules/pas"
project = "${var.project}" env_name = "${var.env_name}" region = "${var.region}" zones = "${var.zones}" pas_cidr = "${var.pas_cidr}" services_cidr = "${var.services_cidr}" internetless = "${var.internetless}" global_lb = "${var.global_lb}" create_gcs_buckets = "${var.create_gcs_buckets}" buckets_location = "${var.buckets_location}"
network = "${module.infra.network}" dns_zone_name = "${module.infra.dns_zone_name}" dns_zone_dns_name = "${module.infra.dns_zone_dns_name}" ssl_certificate = "${module.pas_certs.ssl_certificate}"
isoseg_lb_name = "${module.isolation_segment.load_balancer_name}" external_database = "${var.external_database}" sql_instance = "${module.external_database.sql_instance}" pas_sql_db_host = "${var.pas_sql_db_host}" }
Optional
module "isoseg_certs" { source = "../modules/certs"
subdomains = ["*.iso"] env_name = "${var.env_name}" dns_suffix = "${var.dns_suffix}" resource_name = "isoseg-lbcert"
ssl_cert = "${var.iso_seg_ssl_cert}" ssl_private_key = "${var.iso_seg_ssl_private_key}" ssl_ca_cert = "${var.iso_seg_ssl_ca_cert}" ssl_ca_private_key = "${var.iso_seg_ssl_ca_private_key}" }
module "isolation_segment" { source = "../modules/isolation_segment"
count = "${var.isolation_segment}"
env_name = "${var.env_name}" zones = "${var.zones}" internetless = "${var.internetless}" dns_zone_dns_name = "${var.env_name}.${var.dns_suffix}" with_firewalls = "${var.iso_seg_with_firewalls}"
network = "${module.infra.network}" dns_zone_name = "${module.infra.dns_zone_name}" public_health_check_link = "${module.pas.cf_public_health_check}" infrastructure_subnet_cidr = "${var.infrastructure_cidr}" pas_subnet_cidr = "${module.pas.pas_subnet_ip_cidr_range}" ssl_certificate = "${module.isoseg_certs.ssl_certificate}" replicated_suffix = "${var.iso_seg_replicated_suffix}" }
module "external_database" { source = "../modules/external_database"
create = "${var.external_database}"
env_name = "${var.env_name}" region = "${var.region}" sql_db_tier = "db-n1-standard-1" }
module "internetless" { source = "../modules/internetless"
env_name = "${var.env_name}" internetless = "${var.internetless}" network = "${module.infra.network}"
egress_target_account = "${module.ops_manager.service_account_email}"
internal_cidr_ranges = [ "${module.infra.ip_cidr_range}", "${module.pas.pas_subnet_ip_cidr_range}", "${module.pas.services_subnet_ip_cidr_range}", ] }
module "jumpbox" { source = "../modules/jumpbox"
dns_suffix = "${var.dns_suffix}" availability_zone = "${var.zones[0]}" subnet = "${module.infra.subnet}"
jumpbox_init_script = "${var.jumpbox_init_script}" jumpbox_public_key = "${module.ops_manager.ops_manager_ssh_public_key}" jumpbox_private_key = "${module.ops_manager.ops_manager_ssh_private_key}" env_name = "${var.env_name}" username = "ubuntu" pcf_network = "${module.infra.network}" pcf_managed_zone_name = "${module.infra.dns_zone_name}" }
cat outputs.tf output "iaas" { value = "gcp" }
output "project" { value = "${var.project}" }
output "opsman_service_account_key" { sensitive = true value = "${module.ops_manager.service_account_key}" }
output "region" { value = "${var.region}" }
output "azs" { value = "${var.zones}" }
output "vm_tag" { value = "${var.env_name}-vms" }
output "dns_managed_zone" { value = "${module.infra.dns_zone_name}" }
output "env_dns_zone_name_servers" { value = "${module.infra.dns_zone_name_servers}" }
output "network_name" { value = "${module.infra.network_name}" }
output "director_blobstore_bucket" { value = "${module.ops_manager.director_blobstore_bucket}" }
output "infrastructure_subnet_gateway" { value = "${module.infra.subnet_gateway}" }
output "infrastructure_subnet_cidr" { value = "${module.infra.ip_cidr_range}" }
output "infrastructure_subnet_name" { value = "${module.infra.subnet_name}" }
output "infrastructure_subnets" { value = ["${module.infra.subnet_name}"] }
Ops Manager
output "service_account_email" { value = "${module.ops_manager.service_account_email}" }
output "ops_manager_dns" { value = "${module.ops_manager.ops_manager_dns}" }
output "ops_manager_public_ip" { value = "${module.ops_manager.ops_manager_public_ip}" }
output "ops_manager_ip" { value = "${module.ops_manager.ops_manager_ip}" }
output "ops_manager_ssh_private_key" { sensitive = true value = "${module.ops_manager.ops_manager_ssh_private_key}" }
output "ops_manager_ssh_public_key" { sensitive = true value = "${module.ops_manager.ops_manager_ssh_public_key}" }
Optional Ops Manager
output "optional_ops_manager_dns" { value = "${module.ops_manager.optional_ops_manager_dns}" }
output "optional_ops_manager_public_ip" { value = "${module.ops_manager.optional_ops_manager_public_ip}" }
output "ops_manager_private_ip" { value = "${module.ops_manager.ops_manager_private_ip}" }
PAS
output "pas_blobstore_gcp_service_account_key" { value = "${module.infra.blobstore_gcp_service_account_key}" sensitive = true }
output "pas_blobstore_service_account_email" { value = "${module.infra.blobstore_service_account_email}" }
output "pas_blobstore_service_account_project" { value = "${module.infra.blobstore_service_account_project}" }
output "sys_domain" { value = "${module.pas.sys_domain}" }
output "apps_domain" { value = "${module.pas.apps_domain}" }
output "tcp_domain" { value = "${module.pas.tcp_domain}" }
output "ws_router_pool" { value = "${module.pas.ws_router_pool}" }
output "ssh_lb_name" { value = "${module.pas.ssh_lb_name}" }
output "ssh_router_pool" { value = "${module.pas.ssh_router_pool}" }
output "tcp_lb_name" { value = "${module.pas.tcp_lb_name}" }
output "tcp_router_pool" { value = "${module.pas.tcp_router_pool}" }
output "buildpacks_bucket" { value = "${module.pas.buildpacks_bucket}" }
output "droplets_bucket" { value = "${module.pas.droplets_bucket}" }
output "packages_bucket" { value = "${module.pas.packages_bucket}" }
output "resources_bucket" { value = "${module.pas.resources_bucket}" }
output "backup_bucket" { value = "${module.pas.backup_bucket}" }
output "pas_subnet_gateway" { value = "${module.pas.pas_subnet_gateway}" }
output "pas_subnet_cidr" { value = "${module.pas.pas_subnet_ip_cidr_range}" }
output "pas_subnet_name" { value = "${module.pas.pas_subnet_name}" }
output "pas_subnet" { value = "${module.pas.pas_subnet_name}" }
output "services_subnet_gateway" { value = "${module.pas.services_subnet_gateway}" }
output "services_subnet_cidr" { value = "${module.pas.services_subnet_ip_cidr_range}" }
output "services_subnet_name" { value = "${module.pas.services_subnet_name}" }
output "services_subnet" { value = "${module.pas.services_subnet_name}" }
output "web_lb_name" { value = "${module.pas.lb_name}" }
output "http_lb_backend_name" { value = "${module.pas.lb_name}" }
output "cf_ws_address" { value = "${module.pas.cf_ws_address}" }
output "haproxy_static_ip" { value = "${module.pas.haproxy_static_ip}" }
Certificates
output "ssl_cert" { sensitive = true value = "${module.pas_certs.ssl_cert}" }
output "ssl_private_key" { sensitive = true value = "${module.pas_certs.ssl_private_key}" }
Isolation Segment
output "isoseg_domain" { value = "${module.isolation_segment.domain}" }
output "isoseg_lb_backend_name" { value = "${module.isolation_segment.load_balancer_name}" }
output "iso_seg_ssl_cert" { sensitive = true value = "${module.isoseg_certs.ssl_cert}" }
output "iso_seg_ssl_private_key" { sensitive = true value = "${module.isoseg_certs.ssl_private_key}" }
output "iso_seg_haproxy_static_ip" { value = "${module.isolation_segment.haproxy_static_ip}" }
External Database
output "sql_db_ip" { value = "${module.external_database.ip}" }
output "pas_sql_username" { value = "${module.pas.sql_username}" }
output "pas_sql_password" { sensitive = true value = "${module.pas.sql_password}" }
output "opsman_sql_username" { value = "${module.ops_manager.sql_username}" }
output "opsman_sql_password" { sensitive = true value = "${module.ops_manager.sql_password}" }
output "opsman_sql_db_name" { value = "${module.ops_manager.sql_db_name}" }
/*****
output "management_subnet_gateway" { value = "${module.infra.subnet_gateway}" }
output "management_subnet_cidrs" { value = "${module.infra.subnet_cidrs}" }
output "management_subnet_name" { value = "${module.infra.subnet_name}" }
output "management_subnets" { value = ["${module.infra.subnet_name}"] }
output "infrastructure_subnet_cidrs" { value = "${module.infra.subnet_cidrs}" }
output "pas_subnet_cidrs" { value = ["${module.pas.pas_subnet_ip_cidr_range}"] }
output "services_subnet_cidrs" { value = ["${module.pas.services_subnet_ip_cidr_range}"] }
output "services_subnets" { value = ["${module.pas.services_subnet_name}"] }
output "pas_subnets" { value = ["${module.pas.pas_subnet_name}"] }
Debug Output
An execution plan has been generated and is shown below. Resource actions are indicated with the following symbols:
Terraform will perform the following actions:
module.infra.google_project_iam_member.blobstore_cloud_storage_admin id:
etag:
member: "serviceAccount:${google_service_account.blobstore.email}"
project: "cavisson-tas"
role: "roles/storage.admin"
module.infra.google_service_account.blobstore id:
account_id: "tanzu-blobstore"
display_name: "tanzu Blobstore Service Account"
email:
name:
project:
unique_id:
module.infra.google_service_account_key.blobstore id:
key_algorithm: "KEY_ALG_RSA_2048"
name:
private_key:
private_key_encrypted:
private_key_fingerprint:
private_key_type: "TYPE_GOOGLE_CREDENTIALS_FILE"
public_key:
public_key_type: "TYPE_X509_PEM_FILE"
service_account_id: "${google_service_account.blobstore.id}"
valid_after:
valid_before:
module.ops_manager.google_compute_image.ops-manager-image id:
label_fingerprint:
licenses.#:
name: "tanzu-ops-manager-image"
project:
raw_disk.#: "1"
raw_disk.0.container_type: "TAR"
raw_disk.0.source: "https://storage.googleapis.com/ops-manager-us/pcf-gcp-2.10.21-build.330.tar.gz"
self_link:
module.ops_manager.google_compute_instance.ops-manager id:
boot_disk.#: "1"
boot_disk.0.auto_delete: "true"
boot_disk.0.device_name:
boot_disk.0.disk_encryption_key_sha256:
boot_disk.0.initialize_params.#: "1"
boot_disk.0.initialize_params.0.image: "${google_compute_image.ops-manager-image.self_link}"
boot_disk.0.initialize_params.0.size: "150"
boot_disk.0.initialize_params.0.type: "pd-ssd"
can_ip_forward: "false"
cpu_platform:
create_timeout: "4"
deletion_protection: "false"
guest_accelerator.#:
instance_id:
label_fingerprint:
machine_type: "n1-standard-2"
metadata.%: "2"
metadata.block-project-ssh-keys: "TRUE"
metadata.ssh-keys: "ubuntu:ssh-rsa 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\n"
metadata_fingerprint:
name: "tanzu-ops-manager"
network_interface.#: "1"
network_interface.0.access_config.#: "1"
network_interface.0.access_config.0.assigned_nat_ip:
network_interface.0.access_config.0.nat_ip: "35.244.57.50"
network_interface.0.access_config.0.network_tier:
network_interface.0.address:
network_interface.0.name:
network_interface.0.network_ip:
network_interface.0.subnetwork: "https://www.googleapis.com/compute/v1/projects/cavisson-tas/regions/asia-south1/subnetworks/tanzu-infrastructure-subnet"
network_interface.0.subnetwork_project:
project:
scheduling.#:
self_link:
service_account.#: "1"
service_account.0.email: "tanzu-opsman@cavisson-tas.iam.gserviceaccount.com"
service_account.0.scopes.#: "1"
service_account.0.scopes.1733087937: "https://www.googleapis.com/auth/cloud-platform"
tags.#: "1"
tags.2921574203: "tanzu-ops-manager-external"
tags_fingerprint:
zone: "asia-south1-b"
module.pas.module.gorouter.google_compute_global_forwarding_rule.cf_http id:
ip_address: "35.190.38.138"
ip_protocol:
label_fingerprint:
name: "tanzu-cf-lb-http"
port_range: "80"
project:
self_link:
target: "${google_compute_target_http_proxy.http_lb_proxy.self_link}"
module.pas.module.gorouter.google_compute_global_forwarding_rule.cf_https id:
ip_address: "35.190.38.138"
ip_protocol:
label_fingerprint:
name: "tanzu-cf-lb-https"
port_range: "443"
project:
self_link:
target: "${google_compute_target_https_proxy.https_lb_proxy.self_link}"
module.pas.module.gorouter.google_compute_target_http_proxy.http_lb_proxy id:
creation_timestamp:
description: "really a load balancer but listed as an https proxy"
name: "tanzu-httpproxy"
project:
proxy_id:
self_link:
url_map: "https://www.googleapis.com/compute/v1/projects/cavisson-tas/global/urlMaps/tanzu-cf-http"
module.pas.module.gorouter.google_compute_target_https_proxy.https_lb_proxy id:
creation_timestamp:
description: "really a load balancer but listed as an https proxy"
name: "tanzu-httpsproxy"
project:
proxy_id:
self_link:
ssl_certificates.#: "1"
url_map: "https://www.googleapis.com/compute/v1/projects/cavisson-tas/global/urlMaps/tanzu-cf-http"
Plan: 9 to add, 0 to change, 0 to destroy.
Do you want to perform these actions? Terraform will perform the actions described above. Only 'yes' will be accepted to approve.
Enter a value: yes
module.pas.module.gorouter.google_compute_target_http_proxy.http_lb_proxy: Creating... creation_timestamp: "" => ""
description: "" => "really a load balancer but listed as an https proxy"
name: "" => "tanzu-httpproxy"
project: "" => ""
proxy_id: "" => ""
self_link: "" => ""
url_map: "" => "https://www.googleapis.com/compute/v1/projects/cavisson-tas/global/urlMaps/tanzu-cf-http"
module.pas.module.gorouter.google_compute_target_https_proxy.https_lb_proxy: Creating...
creation_timestamp: "" => ""
description: "" => "really a load balancer but listed as an https proxy"
name: "" => "tanzu-httpsproxy"
project: "" => ""
proxy_id: "" => ""
self_link: "" => ""
ssl_certificates.#: "" => "1"
url_map: "" => "https://www.googleapis.com/compute/v1/projects/cavisson-tas/global/urlMaps/tanzu-cf-http"
module.ops_manager.google_compute_image.ops-manager-image: Creating...
label_fingerprint: "" => ""
licenses.#: "" => ""
name: "" => "tanzu-ops-manager-image"
project: "" => ""
raw_disk.#: "" => "1"
raw_disk.0.container_type: "" => "TAR"
raw_disk.0.source: "" => "https://storage.googleapis.com/ops-manager-us/pcf-gcp-2.10.21-build.330.tar.gz"
self_link: "" => ""
Error: Error applying plan:
4 errors occurred:
module.pas.module.gorouter.google_compute_target_http_proxy.http_lb_proxy: 1 error occurred:
google_compute_target_http_proxy.http_lb_proxy: unexpected EOF
module.ops_manager.google_compute_image.ops-manager-image: 1 error occurred:
google_compute_image.ops-manager-image: unexpected EOF
module.infra.google_service_account.blobstore: unexpected EOF
module.pas.module.gorouter.google_compute_target_https_proxy.https_lb_proxy: 1 error occurred:
google_compute_target_https_proxy.https_lb_proxy: unexpected EOF
Terraform does not automatically rollback in the face of errors. Instead, your Terraform state file has been partially updated with any resources that successfully completed. Please address the error above and apply again to incrementally change your infrastructure.
panic: interface conversion: interface {} is nil, not string 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: goroutine 429 [running]: 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/google.expandComputeTargetHttpsProxySslCertificates(0x16cc860, 0xc000633020, 0xc0006416c0, 0xc0005b4b00, 0xc000633020, 0xc00009ea00, 0x756ea1b9d0aa4d, 0x10) 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/google/resource_compute_target_https_proxy.go:514 +0x3ec 2023-06-15T06:08:59.676Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/google.resourceComputeTargetHttpsProxyCreate(0xc0006416c0, 0x1806920, 0xc0005b4b00, 0xc0006416c0, 0x0) 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/google/resource_compute_target_https_proxy.go:124 +0x45e 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/helper/schema.(Resource).Apply(0xc0002a58f0, 0xc0009431d0, 0xc000632740, 0x1806920, 0xc0005b4b00, 0x40ba01, 0xc00009eb80, 0x4c11dc) 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/helper/schema/resource.go:225 +0x351 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/helper/schema.(Provider).Apply(0xc00067d7a0, 0xc000943180, 0xc0009431d0, 0xc000632740, 0xc0003f5880, 0x53380d134d2c6dfc, 0x7fdf041066c0) 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/helper/schema/provider.go:283 +0x9c 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/plugin.(ResourceProviderServer).Apply(0xc000620560, 0xc0006326e0, 0xc0006d2c90, 0x0, 0x0) 2023-06-15T06:08:59.678Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/teamcity-agent/work/5d79fe75d4460a2f/src/github.com/terraform-providers/terraform-provider-google/vendor/github.com/hashicorp/terraform/plugin/resource_provider.go:527 +0x57 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: reflect.Value.call(0xc000075080, 0xc0008df1f8, 0x13, 0x1b9210e, 0x4, 0xc00009ef18, 0x3, 0x3, 0xc0002b0fc0, 0x4130f7, ...) 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/goenv/versions/1.11.0/src/reflect/value.go:447 +0x449 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: reflect.Value.Call(0xc000075080, 0xc0008df1f8, 0x13, 0xc000882f18, 0x3, 0x3, 0x12a05f200, 0xc000882f10, 0xc000882fb8) 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/goenv/versions/1.11.0/src/reflect/value.go:308 +0xa4 2023/06/15 06:08:59 [ERROR] root.infra: eval: terraform.EvalDiff, err: unexpected EOF 2023/06/15 06:08:59 [ERROR] root.infra: eval: terraform.EvalSequence, err: unexpected EOF 2023/06/15 06:08:59 [TRACE] [walkApply] Exiting eval tree: module.infra.google_service_account.blobstore 2023-06-15T06:08:59.679Z [DEBUG] plugin: plugin process exited: path=/home/ubuntu/pivotal-cf-terraforming-gcp-f4aab02/terraforming-pas/.terraform/plugins/linux_amd64/terraform-provider-google_v1.20.0_x4 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: net/rpc.(service).call(0xc000776880, 0xc000942b40, 0xc000639e78, 0xc000639e90, 0xc000140800, 0xc000620ac0, 0x167a0a0, 0xc0006326e0, 0x16, 0x167a0e0, ...) 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/goenv/versions/1.11.0/src/net/rpc/server.go:384 +0x14e 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: created by net/rpc.(Server).ServeCodec 2023-06-15T06:08:59.679Z [DEBUG] plugin.terraform-provider-google_v1.20.0_x4: /opt/goenv/versions/1.11.0/src/net/rpc/server.go:481 +0x47e 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.output.blobstore_service_account_project" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "output.pas_blobstore_service_account_project" 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalApplyProvisioners 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalIf 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalWriteDiff 2023/06/15 06:08:59 [TRACE] root.ops_manager: eval: terraform.EvalApplyPost 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalApplyProvisioners 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalIf 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteDiff 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalApplyPost 2023/06/15 06:08:59 [ERROR] root.pas.gorouter: eval: terraform.EvalApplyPost, err: 1 error occurred:
2023/06/15 06:08:59 [ERROR] root.pas.gorouter: eval: *terraform.EvalSequence, err: 1 error occurred:
2023/06/15 06:08:59 [TRACE] [walkApply] Exiting eval tree: module.pas.module.gorouter.google_compute_target_http_proxy.http_lb_proxy 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.pas.module.gorouter.google_compute_global_forwarding_rule.cf_http" 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalApplyProvisioners 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalIf 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteState 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalWriteDiff 2023/06/15 06:08:59 [TRACE] root.pas.gorouter: eval: terraform.EvalApplyPost 2023/06/15 06:08:59 [ERROR] root.pas.gorouter: eval: *terraform.EvalApplyPost, err: 1 error occurred:
2023/06/15 06:08:59 [ERROR] root.pas.gorouter: eval: *terraform.EvalSequence, err: 1 error occurred:
2023/06/15 06:08:59 [TRACE] [walkApply] Exiting eval tree: module.pas.module.gorouter.google_compute_target_https_proxy.https_lb_proxy 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.google_service_account_key.blobstore" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.output.blobstore_gcp_service_account_key" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "output.pas_blobstore_gcp_service_account_key" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.output.blobstore_service_account_email" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "output.pas_blobstore_service_account_email" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.infra.google_project_iam_member.blobstore_cloud_storage_admin" 2023/06/15 06:08:59 [ERROR] root.ops_manager: eval: *terraform.EvalApplyPost, err: 1 error occurred:
2023/06/15 06:08:59 [ERROR] root.ops_manager: eval: *terraform.EvalSequence, err: 1 error occurred:
2023/06/15 06:08:59 [TRACE] [walkApply] Exiting eval tree: module.ops_manager.google_compute_image.ops-manager-image 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.ops_manager.google_compute_instance.ops-manager" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.ops_manager.output.ops_manager_private_ip" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "output.ops_manager_private_ip" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "module.pas.module.gorouter.google_compute_global_forwarding_rule.cf_https" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "meta.count-boundary (count boundary fixup)" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "provider.google (close)" 2023/06/15 06:08:59 [TRACE] dag/walk: upstream errored, not walking "root" 2023/06/15 06:08:59 [TRACE] Preserving existing state lineage "6378d989-3802-1b94-eda2-92a1e2338153" 2023/06/15 06:08:59 [TRACE] Preserving existing state lineage "6378d989-3802-1b94-eda2-92a1e2338153" 2023/06/15 06:08:59 [TRACE] Preserving existing state lineage "6378d989-3802-1b94-eda2-92a1e2338153" 2023/06/15 06:08:59 [TRACE] Preserving existing state lineage "6378d989-3802-1b94-eda2-92a1e2338153" 2023/06/15 06:08:59 [DEBUG] plugin: waiting for all plugin processes to complete... 2023-06-15T06:08:59.716Z [WARN ] plugin: error closing client during Kill: err="connection is shut down" 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform: remote-exec-provisioner (internal) 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin084793115: use of closed network connection 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform: remote-exec-provisioner (internal) 2023/06/15 06:08:59 [DEBUG] plugin: waiting for all plugin processes to complete... 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform-provider-template_v2.2.0_x4: 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin513075468: use of closed network connection 2023/06/15 06:08:59 [ERR] yamux: Failed to write header: write unix @->/tmp/plugin513075468: write: broken pipe 2023-06-15T06:08:59.716Z [DEBUG] plugin: plugin process exited: path=/usr/local/bin/terraform 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform: file-provisioner (internal) 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin507725272: use of closed network connection 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform: file-provisioner (internal) 2023/06/15 06:08:59 [DEBUG] plugin: waiting for all plugin processes to complete... 2023-06-15T06:08:59.716Z [DEBUG] plugin.terraform-provider-tls_v2.2.0_x4: 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin926187663: use of closed network connection 2023-06-15T06:08:59.717Z [DEBUG] plugin: plugin process exited: path=/home/ubuntu/pivotal-cf-terraforming-gcp-f4aab02/terraforming-pas/.terraform/plugins/linux_amd64/terraform-provider-template_v2.2.0_x4 2023-06-15T06:08:59.720Z [DEBUG] plugin: plugin process exited: path=/usr/local/bin/terraform 2023-06-15T06:08:59.720Z [DEBUG] plugin: plugin process exited: path=/home/ubuntu/pivotal-cf-terraforming-gcp-f4aab02/terraforming-pas/.terraform/plugins/linux_amd64/terraform-provider-tls_v2.2.0_x4 2023-06-15T06:08:59.720Z [DEBUG] plugin.terraform-provider-random_v2.3.1_x4: 2023/06/15 06:08:59 [ERR] plugin: plugin server: accept unix /tmp/plugin087542132: use of closed network connection 2023-06-15T06:08:59.720Z [DEBUG] plugin: plugin process exited: path=/home/ubuntu/pivotal-cf-terraforming-gcp-f4aab02/terraforming-pas/.terraform/plugins/linux_amd64/terraform-provider-random_v2.3.1_x4
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Terraform crashed! This is always indicative of a bug within Terraform. A crash log has been placed at "crash.log" relative to your current working directory. It would be immensely helpful if you could please report the crash with Terraform1 so that we can fix this.
When reporting bugs, please include your terraform version. That information is available on the first line of crash.log. You can also get it by running 'terraform --version' on the command line.
!!!!!!!!!!!!!!!!!!!!!!!!!!! TERRAFORM CRASH !!!!!!!!!!!!!!!!!!!!!!!!!!!!
Expected Behavior
all the services should be created properly without any crash dump
Actual Behavior
It is getting crashed
Steps to Reproduce
terraform init terraform plan terraform apply
Additional Context
No response
References
No response