Skip to content

Merge pull request #1093 from hashicorp/nd/codeowners #841

Merge pull request #1093 from hashicorp/nd/codeowners

Merge pull request #1093 from hashicorp/nd/codeowners #841

Triggered via push November 15, 2024 19:25
Status Failure
Total duration 5m 48s
Artifacts 1

ci.yml

on: push
Run-Check
0s
Run-Check
E2E Tests Splitting
15s
E2E Tests Splitting
Checks
39s
Checks
Build
18s
Build
Unit and Integration Tests
2m 5s
Unit and Integration Tests
Matrix: E2E Tests
Slack Notification
7s
Slack Notification
Fit to window
Zoom out
Zoom in

Annotations

22 errors
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Waiting to disable 'e2e_task_api_db'... ==> Error: unable to disable 'e2e_task_api_db' Patch \"https://localhost:38343/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_disable ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Waiting to disable 'e2e_task_api_db'... ==> Error: unable to disable 'e2e_task_api_db' Patch \"https://localhost:38343/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_disable ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Inspecting changes to resource if enabling 'e2e_task_api_db'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'e2e_task_api_db' Patch \"https://localhost:38343/v1/tasks/e2e_task_api_db?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_enable ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Inspecting changes to resource if enabling 'e2e_task_api_db'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'e2e_task_api_db' Patch \"https://localhost:38343/v1/tasks/e2e_task_api_db?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_enable ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Marking task 'e2e_task_api_db' for deletion... ==> Error: unable to delete 'e2e_task_api_db' Delete \"https://localhost:38343/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_delete ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Marking task 'e2e_task_api_db' for deletion... ==> Error: unable to delete 'e2e_task_api_db' Delete \"https://localhost:38343/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_delete ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Inspecting changes to resource if creating task 'test-task'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'test-task' Post \"https://localhost:38343/v1/tasks?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_create ---
E2E Tests (1): e2e/command_tls_test.go#L431
command_tls_test.go:431: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431 Error: "==> Inspecting changes to resource if creating task 'test-task'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'test-task' Post \"https://localhost:38343/v1/tasks?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate" Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_create ---
E2E Tests (1)
Process completed with exit code 2.
E2E Tests (0): api_test.go#L315
api_test.go:315: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/api_test.go:315 Error: Should be true Test: TestE2E_TaskEndpoints_UpdateEnableDisable
E2E Tests (0): e2e/command_test.go#L180
command_test.go:180: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:180 Error: Not equal: expected: 1 actual : 0 Test: TestE2E_EnableTaskCommand/happy_path
E2E Tests (0): e2e/command_test.go#L180
command_test.go:180: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:180 Error: Not equal: expected: 1 actual : 0 Test: TestE2E_EnableTaskCommand/auto_approve
E2E Tests (0): e2e/command_test.go#L163
command_test.go:163: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:163 Error: "==> Inspecting changes to resource if enabling 'disabled_task'...\n\n Generating plan that Consul-Terraform-Sync will use Terraform to execute\n\nWarning: 'port' option is deprecated and will be removed in a later version. It is preferred to use the 'http-addr' option instead.\n\n \nTerraform used the selected providers to generate the following execution\nplan. Resource actions are indicated with the following symbols:\n + create\n\nTerraform will perform the following actions:\n\n # module.disabled_task.local_file.address[\"api.node-ea81064a-ca55-8622-7a6d-34dcd33c67f8.dc1\"] will be created\n + resource \"local_file\" \"address\" {\n + content = \"1.2.3.4\"\n + content_base64sha256 = (known after apply)\n + content_base64sha512 = (known after apply)\n + content_md5 = (known after apply)\n + content_sha1 = (known after apply)\n + content_sha256 = (known after apply)\n + content_sha512 = (known after apply)\n + directory_permission = \"0777\"\n + file_permission = \"0777\"\n + filename = \"resources/api.txt\"\n + id = (known after apply)\n }\n\n # module.disabled_task.local_file.address[\"web.node-ea81064a-ca55-8622-7a6d-34dcd33c67f8.dc1\"] will be created\n + resource \"local_file\" \"address\" {\n + content = \"5.6.7.8\"\n + content_base64sha256 = (known after apply)\n + content_base64sha512 = (known after apply)\n + content_md5 = (known after apply)\n + content_sha1 = (known after apply)\n + content_sha256 = (known after apply)\n + content_sha512 = (known after apply)\n + directory_permission = \"0777\"\n + file_permission = \"0777\"\n + filename = \"resources/web.txt\"\n + id = (known after apply)\n }\n\nPlan: 2 to add, 0 to change, 0 to destroy.\n\n==> 'disabled_task' enable complete!\n" does not contain "Cancelled enabling task" Test: TestE2E_EnableTaskCommand/user_does_not_approve_plan
E2E Tests (0): e2e/command_test.go#L170
command_test.go:170: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:170 Error: Not equal: expected: false actual : true Test: TestE2E_EnableTaskCommand/user_does_not_approve_plan
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Terraform exited with code 1.
E2E Tests (0)
Process completed with exit code 2.
E2E Tests (2)
Process completed with exit code 2.
E2E Tests (2): e2e_test.go#L400
e2e_test.go:400: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/e2e_test.go:400 Error: "2024-11-15T19:28:08.100Z [INFO] cli: 0.7.1-dev (e061853)\n2024-11-15T19:28:08.100Z [DEBUG] cli: configuration: config=\"&Config{LogLevel:DEBUG, Port:8558, WorkingDir:tmp_validate_errors, ID:cts-fv-az777-273, Syslog:&SyslogConfig{Enabled:false, Facility:LOCAL0, Name:consul-terraform-sync}, Consul:&ConsulConfig{Address:127.0.0.1:13057, Auth:&AuthConfig{Enabled:false, Username:, Password:}, KVNamespace:, KVPath:consul-terraform-sync/, TLS:&TLSConfig{CACert:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}, Token:, Transport:&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}, ServiceRegistration:&ServiceRegistrationConfig{Enabled:true, ServiceName:consul-terraform-sync, Address:, Namespace:, DefaultCheck: &DefaultCheckConfig{Enabled:true, Address:}}}, Vault:&VaultConfig{Address:, Enabled:false, Namespace:,RenewToken:false, TLS:\"&TLSConfig{CACert:, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}\", Token:false, VaultAgentTokenFile:false, Transport:\"&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}\", UnwrapToken:false}, Driver:&DriverConfig{Terraform:&TerraformConfig{Version:, Log:true, PersistLog:false, Path:/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e, Backend:map[consul:map[address:127.0.0.1:13057 ca_file:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem gzip:true path:consul-terraform-sync/terraform scheme:https]], RequiredProviders:map[]}}, Tasks:{&TaskConfig{Name:cts_error_task, Description:, Providers:[], Services (deprecated):[], Module:./test_modules/incompatible_w_cts, VarFiles:[], Version:, TFVersion: , BufferPeriod:(*BufferPeriodConfig)(nil), Enabled:true, Condition:&CatalogServicesConditionConfig{&CatalogServicesMonitorConfig{Regexp:^api$|^db$, Datacenter:, Namespace:, NodeMeta:map[], UseAsModuleInput:true}}, ModuleInput:{}}}, Services (deprecated):{}, TerraformProviders:{&map[local:(redacted)]}, BufferPeriod:&BufferPeriodConfig{Enabled:false, Min:0s, Max:0s},TLS:&CTSTLSConfig{CACert:, CAPath:, Cert:, Enabled:false, Key:, VerifyIncoming:false}}\"\n2024-11-15T19:28:08.100Z [INFO] ctrl: setting up controller: type=daemon\n2024-11-15T19:28:08.100Z [INFO] ctrl: initializing Consul client and testing connection\n2024-11-15T19:28:08.255Z [INFO] driver.terraform: skipping install, terraform already exists: tf_version=1.7.5 install_path=/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e\n2024-11-15T19:28:08.255Z [INFO] cli: initializing controller\n2024-11-15T19:28:08.255Z [INFO] ctrl: initializing driver factory\n2024-11-15T19:28:08.291Z [INFO] api: starting server: port=8558\n2024-11-15T19:28:08.293Z [DEBUG] registration: creating default HTTP health check: url=http://localhost:8558/v1/health\n2024-11-15T19:28:08.293Z [INFO] ctrl: executing all tasks once through\n2024-11-15T19:28:08.293Z [INFO] ctrl: running task once: task_name=cts_error_task\n2024-11-15T19:28:08.293Z [INFO] client.terraformcli: Terraform logging is set, Terraform logs will output with Consul-Terraform-Sync logs\n2024-11-15T19:28:08.293Z [INFO] driver.terraform: retrieved 0 Terraform handlers for task: task_name=cts_error_task\n2024-11-15T19:28:08.293Z [DEBUG] templates.tftmpl: creating file in root module for task: file_name=providers.auto.tfvars task_name=cts_error_task file_path=tmp_validate_errors/cts_error_task/providers.auto.tfvars\n2024-11-15T19:28:08.293Z [INFO] registration: registering Consul-Terraform-Sync as a service with Consul: id=cts-fv-az777-273 service_name=consul-terraform-sync\n2024-11-15T19:28:08.293Z [DEBUG] client.consul: registerin
E2E Tests (2): e2e_test.go#L401
e2e_test.go:401: Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/e2e_test.go:401 Error: "2024-11-15T19:28:08.100Z [INFO] cli: 0.7.1-dev (e061853)\n2024-11-15T19:28:08.100Z [DEBUG] cli: configuration: config=\"&Config{LogLevel:DEBUG, Port:8558, WorkingDir:tmp_validate_errors, ID:cts-fv-az777-273, Syslog:&SyslogConfig{Enabled:false, Facility:LOCAL0, Name:consul-terraform-sync}, Consul:&ConsulConfig{Address:127.0.0.1:13057, Auth:&AuthConfig{Enabled:false, Username:, Password:}, KVNamespace:, KVPath:consul-terraform-sync/, TLS:&TLSConfig{CACert:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}, Token:, Transport:&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}, ServiceRegistration:&ServiceRegistrationConfig{Enabled:true, ServiceName:consul-terraform-sync, Address:, Namespace:, DefaultCheck: &DefaultCheckConfig{Enabled:true, Address:}}}, Vault:&VaultConfig{Address:, Enabled:false, Namespace:,RenewToken:false, TLS:\"&TLSConfig{CACert:, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}\", Token:false, VaultAgentTokenFile:false, Transport:\"&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}\", UnwrapToken:false}, Driver:&DriverConfig{Terraform:&TerraformConfig{Version:, Log:true, PersistLog:false, Path:/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e, Backend:map[consul:map[address:127.0.0.1:13057 ca_file:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem gzip:true path:consul-terraform-sync/terraform scheme:https]], RequiredProviders:map[]}}, Tasks:{&TaskConfig{Name:cts_error_task, Description:, Providers:[], Services (deprecated):[], Module:./test_modules/incompatible_w_cts, VarFiles:[], Version:, TFVersion: , BufferPeriod:(*BufferPeriodConfig)(nil), Enabled:true, Condition:&CatalogServicesConditionConfig{&CatalogServicesMonitorConfig{Regexp:^api$|^db$, Datacenter:, Namespace:, NodeMeta:map[], UseAsModuleInput:true}}, ModuleInput:{}}}, Services (deprecated):{}, TerraformProviders:{&map[local:(redacted)]}, BufferPeriod:&BufferPeriodConfig{Enabled:false, Min:0s, Max:0s},TLS:&CTSTLSConfig{CACert:, CAPath:, Cert:, Enabled:false, Key:, VerifyIncoming:false}}\"\n2024-11-15T19:28:08.100Z [INFO] ctrl: setting up controller: type=daemon\n2024-11-15T19:28:08.100Z [INFO] ctrl: initializing Consul client and testing connection\n2024-11-15T19:28:08.255Z [INFO] driver.terraform: skipping install, terraform already exists: tf_version=1.7.5 install_path=/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e\n2024-11-15T19:28:08.255Z [INFO] cli: initializing controller\n2024-11-15T19:28:08.255Z [INFO] ctrl: initializing driver factory\n2024-11-15T19:28:08.291Z [INFO] api: starting server: port=8558\n2024-11-15T19:28:08.293Z [DEBUG] registration: creating default HTTP health check: url=http://localhost:8558/v1/health\n2024-11-15T19:28:08.293Z [INFO] ctrl: executing all tasks once through\n2024-11-15T19:28:08.293Z [INFO] ctrl: running task once: task_name=cts_error_task\n2024-11-15T19:28:08.293Z [INFO] client.terraformcli: Terraform logging is set, Terraform logs will output with Consul-Terraform-Sync logs\n2024-11-15T19:28:08.293Z [INFO] driver.terraform: retrieved 0 Terraform handlers for task: task_name=cts_error_task\n2024-11-15T19:28:08.293Z [DEBUG] templates.tftmpl: creating file in root module for task: file_name=providers.auto.tfvars task_name=cts_error_task file_path=tmp_validate_errors/cts_error_task/providers.auto.tfvars\n2024-11-15T19:28:08.293Z [INFO] registration: registering Consul-Terraform-Sync as a service with Consul: id=cts-fv-az777-273 service_name=consul-terraform-sync\n2024-11-15T19:28:08.293Z [DEBUG] client.consul: registerin

Artifacts

Produced during runtime
Name Size
e2e-tests-parts
1.24 KB