terraform-redhat / terraform-provider-rhcs

Terraform provider for Red Hat Cloud Services
Apache License 2.0
45 stars 77 forks source link

data.ocm_rosa_operator_roles.operator_roles fetching error in Windows systems #112

Closed bizcochillo closed 10 months ago

bizcochillo commented 1 year ago

Hello,

we have observed a different behaviour when fetching operator_roles data source from Windows machines. While in Linux hosts the data source data.ocm_rosa_operator_roles successfully populates the operator_roles variables, in Windows we observe an error when calling the operator list.

terraform {
    required_version = ">= 0.12.0"
    required_providers {
    aws = {
      source  = "hashicorp/aws"
      version = ">= 4.20.0"
    }
    ocm = {
      version = ">=1.0.1"
      source  = "terraform-redhat/ocm"
    }
  }
}

provider "aws" {
    region = "eu-central-1"
    ignore_tags {
        key_prefixes = ["kubernetes.io/"]
    }    
}

provider "ocm" {
  token = __REDACTED__
  url   = "https://api.openshift.com"
}

data "ocm_rosa_operator_roles" "operator_roles" {
  operator_role_prefix = "cluster-test"
}

output "operator_roles" {
    value = "${data.ocm_rosa_operator_roles.operator_roles}"
}

Debug output in Windows systems

...
provider.terraform-provider-ocm_v1.0.1.exe: 2023/06/14 16:00:15 {
2023-06-14T16:00:15.952Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "access_token": "***",
2023-06-14T16:00:15.952Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "expires_in": 900,
2023-06-14T16:00:15.952Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "refresh_expires_in": 0,
2023-06-14T16:00:15.952Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "refresh_token": "***",
2023-06-14T16:00:15.952Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "token_type": "Bearer",
2023-06-14T16:00:15.953Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "id_token": "***",
2023-06-14T16:00:15.954Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "not-before-policy": 0,
2023-06-14T16:00:15.955Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "session_state": "b1bad86b-9b22-408d-b4c3-764e5357dfd0",
2023-06-14T16:00:15.955Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe:   "scope": "openid api.iam.service_accounts api.iam.organization offline_access"
2023-06-14T16:00:15.955Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe: }
2023-06-14T16:00:15.955Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe: 2023/06/14 16:00:15 Got tokens on first attempt
2023-06-14T16:00:15.955Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe: 2023/06/14 16:00:15 Request method is GET
2023-06-14T16:00:15.955Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe: 2023/06/14 16:00:15 Request URL is 'https://api.openshift.com/api/clusters_mgmt/v1/aws_inquiries/sts_credential_requests'
2023-06-14T16:00:15.956Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe: 2023/06/14 16:00:15 Request header 'Accept' is 'application/json'
2023-06-14T16:00:15.956Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe: 2023/06/14 16:00:15 Request header 'Authorization' is omitted
2023-06-14T16:00:15.956Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe: 2023/06/14 16:00:15 Request header 'User-Agent' is 'OCM-TF/-'
2023-06-14T16:00:16.137Z [DEBUG] provider.terraform-provider-ocm_v1.0.1.exe: 2023/06/14 16:00:16 Failed to get operator list
2023-06-14T16:00:16.142Z [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = error reading from server: EOF"
2023-06-14T16:00:16.160Z [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/terraform-redhat/ocm/1.0.1/windows_amd64/terraform-provider-ocm_v1.0.1.exe pid=420
2023-06-14T16:00:16.160Z [DEBUG] provider: plugin exited
2023-06-14T16:00:16.161Z [DEBUG] building apply graph to check for errors
2023-06-14T16:00:16.161Z [DEBUG] ProviderTransformer: "data.ocm_rosa_operator_roles.operator_roles (expand)" (*terraform.nodeExpandApplyableResource) needs provider["registry.terraform.io/terraform-redhat/ocm"]
2023-06-14T16:00:16.161Z [DEBUG] pruning unused provider["registry.terraform.io/hashicorp/aws"]
2023-06-14T16:00:16.161Z [DEBUG] ReferenceTransformer: "data.ocm_rosa_operator_roles.operator_roles (expand)" references: []
2023-06-14T16:00:16.161Z [DEBUG] ReferenceTransformer: "output.operator_roles (expand)" references: [data.ocm_rosa_operator_roles.operator_roles (expand)]
. . .

While in Linux the operator list is retrieved correctly:

2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 {
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "access_token": "***",
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "expires_in": 900,
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "refresh_expires_in": 0,
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "refresh_token": "***",
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "token_type": "Bearer",
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "id_token": "***",
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "not-before-policy": 0,
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "session_state": "b1bad86b-9b22-408d-b4c3-764e5357dfd0",
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "scope": "openid api.iam.service_accounts api.iam.organization offline_access"
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: }
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Got tokens on first attempt
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Request method is GET
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Request URL is 'https://api.openshift.com/api/clusters_mgmt/v1/aws_inquiries/sts_credential_requests'
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Request header 'Accept' is 'application/json'
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Request header 'Authorization' is omitted
2023-06-14T18:02:23.041+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Request header 'User-Agent' is 'OCM-TF/-'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response protocol is 'HTTP/2.0'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response status is '200 OK'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response header 'Content-Type' is 'application/json'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response header 'Date' is 'Wed, 14 Jun 2023 16:02:23 GMT'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response header 'Server' is 'envoy'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response header 'Vary' is 'Accept-Encoding'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response header 'X-Envoy-Upstream-Service-Time' is '2'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response header 'X-Operation-Id' is '901b5da1-553d-4bc1-8972-17e6a5d9f87d'
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 Response body follows
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: 2023/06/14 18:02:23 {
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "kind": "STSCredentialRequest",
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "page": 1,
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "size": 6,
2023-06-14T18:02:23.417+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "total": 6,
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   "items": [
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "kind": "STSOperator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "name": "machine_api_aws_cloud_credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "operator": {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "name": "aws-cloud-credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "namespace": "openshift-machine-api",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "service_accounts": [
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:           "machine-api-controllers"
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         ],
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "min_version": "",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "max_version": ""
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       }
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     },
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "kind": "STSOperator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "name": "cloud_credential_operator_cloud_credential_operator_iam_ro_creds",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "operator": {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "name": "cloud-credential-operator-iam-ro-creds",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "namespace": "openshift-cloud-credential-operator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "service_accounts": [
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:           "cloud-credential-operator"
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         ],
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "min_version": "",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "max_version": ""
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       }
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     },
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "kind": "STSOperator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "name": "image_registry_installer_cloud_credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "operator": {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "name": "installer-cloud-credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "namespace": "openshift-image-registry",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "service_accounts": [
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:           "cluster-image-registry-operator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:           "registry"
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         ],
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "min_version": "",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "max_version": ""
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       }
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     },
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "kind": "STSOperator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "name": "ingress_operator_cloud_credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "operator": {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "name": "cloud-credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "namespace": "openshift-ingress-operator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "service_accounts": [
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:           "ingress-operator"
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         ],
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "min_version": "",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "max_version": ""
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       }
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     },
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "kind": "STSOperator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "name": "cluster_csi_drivers_ebs_cloud_credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "operator": {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "name": "ebs-cloud-credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "namespace": "openshift-cluster-csi-drivers",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "service_accounts": [
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:           "aws-ebs-csi-driver-operator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:           "aws-ebs-csi-driver-controller-sa"
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         ],
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "min_version": "",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "max_version": ""
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       }
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     },
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "kind": "STSOperator",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "name": "cloud_network_config_controller_cloud_credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       "operator": {
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "name": "cloud-credentials",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "namespace": "openshift-cloud-network-config-controller",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "service_accounts": [
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:           "cloud-network-config-controller"
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         ],
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "min_version": "4.10",
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:         "max_version": ""
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:       }
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:     }
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1:   ]
2023-06-14T18:02:23.418+0200 [DEBUG] provider.terraform-provider-ocm_v1.0.1: }

With best regards, Abel.

tshefi commented 1 year ago

@bizcochillo Hey, going to look into this, any bits of information you can share may help me reproduce/debug.

  1. It shouldn't matter, still I'm curious, which Windows version were you using when you hit this, 10 11 ?
  2. What were you trying to do when you hit this, creating account roles or something else?
  3. Which version of OCP were you planning on installing?
  4. Where you planning on using ROSA classic or OIDC managed or unmanaged?

As a first step, I'll try to create account roles and deploy a cluster using the latest versions of Terraform and RHCS (what was once called OCM) to see if I can reproduce issue.

tshefi commented 1 year ago

OK first issue I hit while attempting to deploy a cluster (OIDC managed from Windows 10), local folder path I'd used was too long, I'll address the issue and retry.

│ Error: Failed to download module │ │ on ..\oidc_provider\[main.tf](http://main.tf/) line 74: │ 74: module "operator_roles_and_oidc_provider" { │ │ Could not download module "operator_roles_and_oidc_provider" (..\oidc_provider\main.tf:74) source code from │ "git::https://github.com/terraform-redhat/terraform-aws-rosa-sts?ref=v0.0.12": error downloading │ '[https://github.com/terraform-redhat/terraform-aws-rosa-sts?ref=v0.0.12'](https://github.com/terraform-redhat/terraform-aws-rosa-sts?ref=v0.0.12%27): C:\Program Files\Git\cmd\git.exe exited with 128: Cloning │ into '.terraform\modules\oidc_config.operator_roles_and_oidc_provider'... │ error: unable to open loose object ca95569d51db05b3d00055fe1360ad5670f41102: Filename too long │ error: unable to open loose object ca95569d51db05b3d00055fe1360ad5670f41102: Filename too long

Shorting path via moving git repo to c:\terraform-provider-rhcs resolved the above issue. Windows is more susceptible to longer folder paths than Linux.

tshefi commented 1 year ago

From a Windows 10 system, successfully created account roles and deployed an OIDC managed cluster OCP 4.13.5 Using versions: Terraform v1.5.4 on windows_amd64

Final install lines: rhcs_cluster_wait.rosa_cluster: Creation complete after 28m14s Apply complete! Resources: 2 added, 0 changed, 0 destroyed. Outputs: cluster_id = "25ejrtekdoi0m59qq3md0um08r213kdr" ....

$ rosa describe cluster -c ts-mw0608

Name: ts-mw0608 ID: 25ejrtekdoi0m59qq3md0um08r213kdr External ID: 2a36b35d-4493-4995-b908-628c5a5a6579 Control Plane: Customer Hosted OpenShift Version:
Channel Group: stable DNS: ts-mw0608.2me4.s1.devshift.org AWS Account: 42546....... API URL: https://api.ts-mw0608.2me4..... Console URL: https://console-openshift-console.apps.ts-mw060...... Region: us-east-1 Multi-AZ: false Nodes:

bizcochillo commented 1 year ago

Hi @tshefi, thank you for your feedback.

We hit this in two Windows 10 machines and we wanted to install a 4.12.x STS ROSA cluster. We experience this when we were investigating a terraform based approach, just a couple of weeks before the renaming from terraform-redhat/ocm to terraform-redhat/rhcs (version 1.0.4, maybe).

As per the logs provided in my first message, it seems to be some kind of failure by handling the https://api.openshift.com/api/clusters_mgmt/v1/aws_inquiries/sts_credential_requests response, probably by the underlying AWS SDK, but obviously I had no more information.

I don't have those machines by now, but doing the exactly same steps from a fresh windows installation reproduced the error then. I will go through it again and will provide feedback.

With best regards

tshefi commented 1 year ago

Hi @bizcochillo

Thanks for the update, waiting to hear from you. Shall the need arise I can retry again this time a 4.12.x classic STS ROSA cluster on api.openshift.com.

nirarg commented 10 months ago

@bizcochillo and @tshefi Thank you for bringing and checking this issue I'm closing this issue as it old one Feel free to reopen this in case the issue gets reproduced again