Skip to content

build: update ci gha to use the correct TF version #812

build: update ci gha to use the correct TF version

build: update ci gha to use the correct TF version #812

Re-run triggered May 9, 2024 17:59
Status Failure
Total duration 8m 22s
Artifacts 1

ci.yml

on: push
Run-Check
0s
Run-Check
E2E Tests Splitting
25s
E2E Tests Splitting
Checks
53s
Checks
Build
19s
Build
Unit and Integration Tests
2m 0s
Unit and Integration Tests
Matrix: E2E Tests
Slack Notification
0s
Slack Notification
Fit to window
Zoom out
Zoom in

Annotations

24 errors
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Waiting to disable 'e2e_task_api_db'... ==> Error: unable to disable 'e2e_task_api_db' Patch \"https://localhost:35529/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_disable ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Waiting to disable 'e2e_task_api_db'... ==> Error: unable to disable 'e2e_task_api_db' Patch \"https://localhost:35529/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_disable ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Inspecting changes to resource if enabling 'e2e_task_api_db'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'e2e_task_api_db' Patch \"https://localhost:35529/v1/tasks/e2e_task_api_db?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_enable ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Inspecting changes to resource if enabling 'e2e_task_api_db'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'e2e_task_api_db' Patch \"https://localhost:35529/v1/tasks/e2e_task_api_db?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_enable ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Marking task 'e2e_task_api_db' for deletion... ==> Error: unable to delete 'e2e_task_api_db' Delete \"https://localhost:35529/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_delete ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Marking task 'e2e_task_api_db' for deletion... ==> Error: unable to delete 'e2e_task_api_db' Delete \"https://localhost:35529/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_delete ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Inspecting changes to resource if creating task 'test-task'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'test-task' Post \"https://localhost:35529/v1/tasks?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_create ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Inspecting changes to resource if creating task 'test-task'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'test-task' Post \"https://localhost:35529/v1/tasks?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_create ---
E2E Tests (1)
Process completed with exit code 2.
E2E Tests (0): api_test.go#L315
api_test.go:315: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/api_test.go:315 Error: Should be true Test: TestE2E_TaskEndpoints_UpdateEnableDisable
E2E Tests (0): e2e/command_test.go#L180
command_test.go:180: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:180 Error: Not equal: expected: 1 actual : 0 Test: TestE2E_EnableTaskCommand/happy_path
E2E Tests (0): e2e/command_test.go#L180
command_test.go:180: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:180 Error: Not equal: expected: 1 actual : 0 Test: TestE2E_EnableTaskCommand/auto_approve
E2E Tests (0): e2e/command_test.go#L163
command_test.go:163: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:163 Error: "==> Inspecting changes to resource if enabling 'disabled_task'...\n\n Generating plan that Consul-Terraform-Sync will use Terraform to execute\n\nWarning: 'port' option is deprecated and will be removed in a later version. It is preferred to use the 'http-addr' option instead.\n\n \nTerraform used the selected providers to generate the following execution\nplan. Resource actions are indicated with the following symbols:\n + create\n\nTerraform will perform the following actions:\n\n # module.disabled_task.local_file.address[\"api.node-92819c2c-c241-6833-cfc6-1f020430a4fe.dc1\"] will be created\n + resource \"local_file\" \"address\" {\n + content = \"1.2.3.4\"\n + content_base64sha256 = (known after apply)\n + content_base64sha512 = (known after apply)\n + content_md5 = (known after apply)\n + content_sha1 = (known after apply)\n + content_sha256 = (known after apply)\n + content_sha512 = (known after apply)\n + directory_permission = \"0777\"\n + file_permission = \"0777\"\n + filename = \"resources/api.txt\"\n + id = (known after apply)\n }\n\n # module.disabled_task.local_file.address[\"web.node-92819c2c-c241-6833-cfc6-1f020430a4fe.dc1\"] will be created\n + resource \"local_file\" \"address\" {\n + content = \"5.6.7.8\"\n + content_base64sha256 = (known after apply)\n + content_base64sha512 = (known after apply)\n + content_md5 = (known after apply)\n + content_sha1 = (known after apply)\n + content_sha256 = (known after apply)\n + content_sha512 = (known after apply)\n + directory_permission = \"0777\"\n + file_permission = \"0777\"\n + filename = \"resources/web.txt\"\n + id = (known after apply)\n }\n\nPlan: 2 to add, 0 to change, 0 to destroy.\n\n==> 'disabled_task' enable complete!\n" does not contain "Cancelled enabling task" Test: TestE2E_EnableTaskCommand/user_does_not_approve_plan
E2E Tests (0): e2e/command_test.go#L170
command_test.go:170: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:170 Error: Not equal: expected: false actual : true Test: TestE2E_EnableTaskCommand/user_does_not_approve_plan
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Process completed with exit code 2.
E2E Tests (2)
Process completed with exit code 2.
E2E Tests (2): e2e_test.go#L400
e2e_test.go:400: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/e2e_test.go:400 Error: "2024-05-09T18:01:08.954Z [INFO] cli: 0.7.1-dev (0d8ecb1)\n2024-05-09T18:01:08.954Z [DEBUG] cli: configuration: config=\"&Config{LogLevel:DEBUG, Port:8558, WorkingDir:tmp_validate_errors, ID:cts-fv-az1391-410, Syslog:&SyslogConfig{Enabled:false, Facility:LOCAL0, Name:consul-terraform-sync}, Consul:&ConsulConfig{Address:127.0.0.1:17533, Auth:&AuthConfig{Enabled:false, Username:, Password:}, KVNamespace:, KVPath:consul-terraform-sync/, TLS:&TLSConfig{CACert:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}, Token:, Transport:&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}, ServiceRegistration:&ServiceRegistrationConfig{Enabled:true, ServiceName:consul-terraform-sync, Address:, Namespace:, DefaultCheck: &DefaultCheckConfig{Enabled:true, Address:}}}, Vault:&VaultConfig{Address:, Enabled:false, Namespace:,RenewToken:false, TLS:\"&TLSConfig{CACert:, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}\", Token:false, VaultAgentTokenFile:false, Transport:\"&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}\", UnwrapToken:false}, Driver:&DriverConfig{Terraform:&TerraformConfig{Version:, Log:true, PersistLog:false, Path:/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e, Backend:map[consul:map[address:127.0.0.1:17533 ca_file:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem gzip:true path:consul-terraform-sync/terraform scheme:https]], RequiredProviders:map[]}}, Tasks:{&TaskConfig{Name:cts_error_task, Description:, Providers:[], Services (deprecated):[], Module:./test_modules/incompatible_w_cts, VarFiles:[], Version:, TFVersion: , BufferPeriod:(*BufferPeriodConfig)(nil), Enabled:true, Condition:&CatalogServicesConditionConfig{&CatalogServicesMonitorConfig{Regexp:^api$|^db$, Datacenter:, Namespace:, NodeMeta:map[], UseAsModuleInput:true}}, ModuleInput:{}}}, Services (deprecated):{}, TerraformProviders:{&map[local:(redacted)]}, BufferPeriod:&BufferPeriodConfig{Enabled:false, Min:0s, Max:0s},TLS:&CTSTLSConfig{CACert:, CAPath:, Cert:, Enabled:false, Key:, VerifyIncoming:false}}\"\n2024-05-09T18:01:08.955Z [INFO] ctrl: setting up controller: type=daemon\n2024-05-09T18:01:08.955Z [INFO] ctrl: initializing Consul client and testing connection\n2024-05-09T18:01:09.198Z [INFO] driver.terraform: skipping install, terraform already exists: tf_version=1.7.5 install_path=/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e\n2024-05-09T18:01:09.198Z [INFO] cli: initializing controller\n2024-05-09T18:01:09.198Z [INFO] ctrl: initializing driver factory\n2024-05-09T18:01:09.255Z [INFO] api: starting server: port=8558\n2024-05-09T18:01:09.258Z [DEBUG] registration: creating default HTTP health check: url=http://localhost:8558/v1/health\n2024-05-09T18:01:09.258Z [INFO] ctrl: executing all tasks once through\n2024-05-09T18:01:09.258Z [INFO] ctrl: running task once: task_name=cts_error_task\n2024-05-09T18:01:09.258Z [INFO] client.terraformcli: Terraform logging is set, Terraform logs will output with Consul-Terraform-Sync logs\n2024-05-09T18:01:09.259Z [INFO] driver.terraform: retrieved 0 Terraform handlers for task: task_name=cts_error_task\n2024-05-09T18:01:09.259Z [DEBUG] templates.tftmpl: creating file in root module for task: file_name=main.tf task_name=cts_error_task file_path=tmp_validate_errors/cts_error_task/main.tf\n2024-05-09T18:01:09.259Z [INFO] registration: registering Consul-Terraform-Sync as a service with Consul: id=cts-fv-az1391-410 service_name=consul-terraform-sync\n2024-05-09T18:01:09.259Z [DEBUG] client.consul: registering service: service_id=cts-
E2E Tests (2): e2e_test.go#L401
e2e_test.go:401: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/e2e_test.go:401 Error: "2024-05-09T18:01:08.954Z [INFO] cli: 0.7.1-dev (0d8ecb1)\n2024-05-09T18:01:08.954Z [DEBUG] cli: configuration: config=\"&Config{LogLevel:DEBUG, Port:8558, WorkingDir:tmp_validate_errors, ID:cts-fv-az1391-410, Syslog:&SyslogConfig{Enabled:false, Facility:LOCAL0, Name:consul-terraform-sync}, Consul:&ConsulConfig{Address:127.0.0.1:17533, Auth:&AuthConfig{Enabled:false, Username:, Password:}, KVNamespace:, KVPath:consul-terraform-sync/, TLS:&TLSConfig{CACert:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}, Token:, Transport:&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}, ServiceRegistration:&ServiceRegistrationConfig{Enabled:true, ServiceName:consul-terraform-sync, Address:, Namespace:, DefaultCheck: &DefaultCheckConfig{Enabled:true, Address:}}}, Vault:&VaultConfig{Address:, Enabled:false, Namespace:,RenewToken:false, TLS:\"&TLSConfig{CACert:, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}\", Token:false, VaultAgentTokenFile:false, Transport:\"&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}\", UnwrapToken:false}, Driver:&DriverConfig{Terraform:&TerraformConfig{Version:, Log:true, PersistLog:false, Path:/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e, Backend:map[consul:map[address:127.0.0.1:17533 ca_file:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem gzip:true path:consul-terraform-sync/terraform scheme:https]], RequiredProviders:map[]}}, Tasks:{&TaskConfig{Name:cts_error_task, Description:, Providers:[], Services (deprecated):[], Module:./test_modules/incompatible_w_cts, VarFiles:[], Version:, TFVersion: , BufferPeriod:(*BufferPeriodConfig)(nil), Enabled:true, Condition:&CatalogServicesConditionConfig{&CatalogServicesMonitorConfig{Regexp:^api$|^db$, Datacenter:, Namespace:, NodeMeta:map[], UseAsModuleInput:true}}, ModuleInput:{}}}, Services (deprecated):{}, TerraformProviders:{&map[local:(redacted)]}, BufferPeriod:&BufferPeriodConfig{Enabled:false, Min:0s, Max:0s},TLS:&CTSTLSConfig{CACert:, CAPath:, Cert:, Enabled:false, Key:, VerifyIncoming:false}}\"\n2024-05-09T18:01:08.955Z [INFO] ctrl: setting up controller: type=daemon\n2024-05-09T18:01:08.955Z [INFO] ctrl: initializing Consul client and testing connection\n2024-05-09T18:01:09.198Z [INFO] driver.terraform: skipping install, terraform already exists: tf_version=1.7.5 install_path=/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e\n2024-05-09T18:01:09.198Z [INFO] cli: initializing controller\n2024-05-09T18:01:09.198Z [INFO] ctrl: initializing driver factory\n2024-05-09T18:01:09.255Z [INFO] api: starting server: port=8558\n2024-05-09T18:01:09.258Z [DEBUG] registration: creating default HTTP health check: url=http://localhost:8558/v1/health\n2024-05-09T18:01:09.258Z [INFO] ctrl: executing all tasks once through\n2024-05-09T18:01:09.258Z [INFO] ctrl: running task once: task_name=cts_error_task\n2024-05-09T18:01:09.258Z [INFO] client.terraformcli: Terraform logging is set, Terraform logs will output with Consul-Terraform-Sync logs\n2024-05-09T18:01:09.259Z [INFO] driver.terraform: retrieved 0 Terraform handlers for task: task_name=cts_error_task\n2024-05-09T18:01:09.259Z [DEBUG] templates.tftmpl: creating file in root module for task: file_name=main.tf task_name=cts_error_task file_path=tmp_validate_errors/cts_error_task/main.tf\n2024-05-09T18:01:09.259Z [INFO] registration: registering Consul-Terraform-Sync as a service with Consul: id=cts-fv-az1391-410 service_name=consul-terraform-sync\n2024-05-09T18:01:09.259Z [DEBUG] client.consul: registering service: service_id=cts-