Merge pull request #1093 from hashicorp/nd/codeowners #841
ci.yml
on: push
Annotations
22 errors
E2E Tests (1):
e2e/command_tls_test.go#L431
command_tls_test.go:431:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431
Error: "==> Waiting to disable 'e2e_task_api_db'... ==> Error: unable to disable 'e2e_task_api_db' Patch \"https://localhost:38343/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate"
Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_disable
---
|
E2E Tests (1):
e2e/command_tls_test.go#L431
command_tls_test.go:431:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431
Error: "==> Waiting to disable 'e2e_task_api_db'... ==> Error: unable to disable 'e2e_task_api_db' Patch \"https://localhost:38343/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate"
Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_disable
---
|
E2E Tests (1):
e2e/command_tls_test.go#L431
command_tls_test.go:431:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431
Error: "==> Inspecting changes to resource if enabling 'e2e_task_api_db'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'e2e_task_api_db' Patch \"https://localhost:38343/v1/tasks/e2e_task_api_db?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate"
Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_enable
---
|
E2E Tests (1):
e2e/command_tls_test.go#L431
command_tls_test.go:431:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431
Error: "==> Inspecting changes to resource if enabling 'e2e_task_api_db'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'e2e_task_api_db' Patch \"https://localhost:38343/v1/tasks/e2e_task_api_db?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate"
Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_enable
---
|
E2E Tests (1):
e2e/command_tls_test.go#L431
command_tls_test.go:431:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431
Error: "==> Marking task 'e2e_task_api_db' for deletion... ==> Error: unable to delete 'e2e_task_api_db' Delete \"https://localhost:38343/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate"
Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_delete
---
|
E2E Tests (1):
e2e/command_tls_test.go#L431
command_tls_test.go:431:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431
Error: "==> Marking task 'e2e_task_api_db' for deletion... ==> Error: unable to delete 'e2e_task_api_db' Delete \"https://localhost:38343/v1/tasks/e2e_task_api_db\": remote error: tls: certificate required " does not contain "bad certificate"
Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_delete
---
|
E2E Tests (1):
e2e/command_tls_test.go#L431
command_tls_test.go:431:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431
Error: "==> Inspecting changes to resource if creating task 'test-task'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'test-task' Post \"https://localhost:38343/v1/tasks?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate"
Test: TestE2E_CommandMTLSErrors/no_client_cert_key_pair_provided_task_create
---
|
E2E Tests (1):
e2e/command_tls_test.go#L431
command_tls_test.go:431:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_tls_test.go:431
Error: "==> Inspecting changes to resource if creating task 'test-task'... Generating plan that Consul-Terraform-Sync will use Terraform to execute ==> Error: unable to generate plan for 'test-task' Post \"https://localhost:38343/v1/tasks?run=inspect\": remote error: tls: certificate required " does not contain "bad certificate"
Test: TestE2E_CommandMTLSErrors/ssl_verify_disabled_and_no_cert_key_pair_provided_task_create
---
|
E2E Tests (1)
Process completed with exit code 2.
|
E2E Tests (0):
api_test.go#L315
api_test.go:315:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/api_test.go:315
Error: Should be true
Test: TestE2E_TaskEndpoints_UpdateEnableDisable
|
E2E Tests (0):
e2e/command_test.go#L180
command_test.go:180:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:180
Error: Not equal:
expected: 1
actual : 0
Test: TestE2E_EnableTaskCommand/happy_path
|
E2E Tests (0):
e2e/command_test.go#L180
command_test.go:180:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:180
Error: Not equal:
expected: 1
actual : 0
Test: TestE2E_EnableTaskCommand/auto_approve
|
E2E Tests (0):
e2e/command_test.go#L163
command_test.go:163:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:163
Error: "==> Inspecting changes to resource if enabling 'disabled_task'...\n\n Generating plan that Consul-Terraform-Sync will use Terraform to execute\n\nWarning: 'port' option is deprecated and will be removed in a later version. It is preferred to use the 'http-addr' option instead.\n\n \nTerraform used the selected providers to generate the following execution\nplan. Resource actions are indicated with the following symbols:\n + create\n\nTerraform will perform the following actions:\n\n # module.disabled_task.local_file.address[\"api.node-ea81064a-ca55-8622-7a6d-34dcd33c67f8.dc1\"] will be created\n + resource \"local_file\" \"address\" {\n + content = \"1.2.3.4\"\n + content_base64sha256 = (known after apply)\n + content_base64sha512 = (known after apply)\n + content_md5 = (known after apply)\n + content_sha1 = (known after apply)\n + content_sha256 = (known after apply)\n + content_sha512 = (known after apply)\n + directory_permission = \"0777\"\n + file_permission = \"0777\"\n + filename = \"resources/api.txt\"\n + id = (known after apply)\n }\n\n # module.disabled_task.local_file.address[\"web.node-ea81064a-ca55-8622-7a6d-34dcd33c67f8.dc1\"] will be created\n + resource \"local_file\" \"address\" {\n + content = \"5.6.7.8\"\n + content_base64sha256 = (known after apply)\n + content_base64sha512 = (known after apply)\n + content_md5 = (known after apply)\n + content_sha1 = (known after apply)\n + content_sha256 = (known after apply)\n + content_sha512 = (known after apply)\n + directory_permission = \"0777\"\n + file_permission = \"0777\"\n + filename = \"resources/web.txt\"\n + id = (known after apply)\n }\n\nPlan: 2 to add, 0 to change, 0 to destroy.\n\n==> 'disabled_task' enable complete!\n" does not contain "Cancelled enabling task"
Test: TestE2E_EnableTaskCommand/user_does_not_approve_plan
|
E2E Tests (0):
e2e/command_test.go#L170
command_test.go:170:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/command_test.go:170
Error: Not equal:
expected: false
actual : true
Test: TestE2E_EnableTaskCommand/user_does_not_approve_plan
|
E2E Tests (0)
Terraform exited with code 1.
|
E2E Tests (0)
Terraform exited with code 1.
|
E2E Tests (0)
Terraform exited with code 1.
|
E2E Tests (0)
Terraform exited with code 1.
|
E2E Tests (0)
Process completed with exit code 2.
|
E2E Tests (2)
Process completed with exit code 2.
|
E2E Tests (2):
e2e_test.go#L400
e2e_test.go:400:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/e2e_test.go:400
Error: "2024-11-15T19:28:08.100Z [INFO] cli: 0.7.1-dev (e061853)\n2024-11-15T19:28:08.100Z [DEBUG] cli: configuration: config=\"&Config{LogLevel:DEBUG, Port:8558, WorkingDir:tmp_validate_errors, ID:cts-fv-az777-273, Syslog:&SyslogConfig{Enabled:false, Facility:LOCAL0, Name:consul-terraform-sync}, Consul:&ConsulConfig{Address:127.0.0.1:13057, Auth:&AuthConfig{Enabled:false, Username:, Password:}, KVNamespace:, KVPath:consul-terraform-sync/, TLS:&TLSConfig{CACert:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}, Token:, Transport:&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}, ServiceRegistration:&ServiceRegistrationConfig{Enabled:true, ServiceName:consul-terraform-sync, Address:, Namespace:, DefaultCheck: &DefaultCheckConfig{Enabled:true, Address:}}}, Vault:&VaultConfig{Address:, Enabled:false, Namespace:,RenewToken:false, TLS:\"&TLSConfig{CACert:, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}\", Token:false, VaultAgentTokenFile:false, Transport:\"&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}\", UnwrapToken:false}, Driver:&DriverConfig{Terraform:&TerraformConfig{Version:, Log:true, PersistLog:false, Path:/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e, Backend:map[consul:map[address:127.0.0.1:13057 ca_file:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem gzip:true path:consul-terraform-sync/terraform scheme:https]], RequiredProviders:map[]}}, Tasks:{&TaskConfig{Name:cts_error_task, Description:, Providers:[], Services (deprecated):[], Module:./test_modules/incompatible_w_cts, VarFiles:[], Version:, TFVersion: , BufferPeriod:(*BufferPeriodConfig)(nil), Enabled:true, Condition:&CatalogServicesConditionConfig{&CatalogServicesMonitorConfig{Regexp:^api$|^db$, Datacenter:, Namespace:, NodeMeta:map[], UseAsModuleInput:true}}, ModuleInput:{}}}, Services (deprecated):{}, TerraformProviders:{&map[local:(redacted)]}, BufferPeriod:&BufferPeriodConfig{Enabled:false, Min:0s, Max:0s},TLS:&CTSTLSConfig{CACert:, CAPath:, Cert:, Enabled:false, Key:, VerifyIncoming:false}}\"\n2024-11-15T19:28:08.100Z [INFO] ctrl: setting up controller: type=daemon\n2024-11-15T19:28:08.100Z [INFO] ctrl: initializing Consul client and testing connection\n2024-11-15T19:28:08.255Z [INFO] driver.terraform: skipping install, terraform already exists: tf_version=1.7.5 install_path=/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e\n2024-11-15T19:28:08.255Z [INFO] cli: initializing controller\n2024-11-15T19:28:08.255Z [INFO] ctrl: initializing driver factory\n2024-11-15T19:28:08.291Z [INFO] api: starting server: port=8558\n2024-11-15T19:28:08.293Z [DEBUG] registration: creating default HTTP health check: url=http://localhost:8558/v1/health\n2024-11-15T19:28:08.293Z [INFO] ctrl: executing all tasks once through\n2024-11-15T19:28:08.293Z [INFO] ctrl: running task once: task_name=cts_error_task\n2024-11-15T19:28:08.293Z [INFO] client.terraformcli: Terraform logging is set, Terraform logs will output with Consul-Terraform-Sync logs\n2024-11-15T19:28:08.293Z [INFO] driver.terraform: retrieved 0 Terraform handlers for task: task_name=cts_error_task\n2024-11-15T19:28:08.293Z [DEBUG] templates.tftmpl: creating file in root module for task: file_name=providers.auto.tfvars task_name=cts_error_task file_path=tmp_validate_errors/cts_error_task/providers.auto.tfvars\n2024-11-15T19:28:08.293Z [INFO] registration: registering Consul-Terraform-Sync as a service with Consul: id=cts-fv-az777-273 service_name=consul-terraform-sync\n2024-11-15T19:28:08.293Z [DEBUG] client.consul: registerin
|
E2E Tests (2):
e2e_test.go#L401
e2e_test.go:401:
Error Trace: /home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e/e2e_test.go:401
Error: "2024-11-15T19:28:08.100Z [INFO] cli: 0.7.1-dev (e061853)\n2024-11-15T19:28:08.100Z [DEBUG] cli: configuration: config=\"&Config{LogLevel:DEBUG, Port:8558, WorkingDir:tmp_validate_errors, ID:cts-fv-az777-273, Syslog:&SyslogConfig{Enabled:false, Facility:LOCAL0, Name:consul-terraform-sync}, Consul:&ConsulConfig{Address:127.0.0.1:13057, Auth:&AuthConfig{Enabled:false, Username:, Password:}, KVNamespace:, KVPath:consul-terraform-sync/, TLS:&TLSConfig{CACert:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}, Token:, Transport:&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}, ServiceRegistration:&ServiceRegistrationConfig{Enabled:true, ServiceName:consul-terraform-sync, Address:, Namespace:, DefaultCheck: &DefaultCheckConfig{Enabled:true, Address:}}}, Vault:&VaultConfig{Address:, Enabled:false, Namespace:,RenewToken:false, TLS:\"&TLSConfig{CACert:, CAPath:, Cert:, Enabled:true, Key:, ServerName:, Verify:true}\", Token:false, VaultAgentTokenFile:false, Transport:\"&TransportConfig{DialKeepAlive:30s, DialTimeout:30s, DisableKeepAlives:false, IdleConnTimeout:5000000000, MaxIdleConns:0, MaxIdleConnsPerHost:100, TLSHandshakeTimeout:10s}\", UnwrapToken:false}, Driver:&DriverConfig{Terraform:&TerraformConfig{Version:, Log:true, PersistLog:false, Path:/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e, Backend:map[consul:map[address:127.0.0.1:13057 ca_file:/home/runner/work/consul-terraform-sync/consul-terraform-sync/testutils/certs/consul_cert.pem gzip:true path:consul-terraform-sync/terraform scheme:https]], RequiredProviders:map[]}}, Tasks:{&TaskConfig{Name:cts_error_task, Description:, Providers:[], Services (deprecated):[], Module:./test_modules/incompatible_w_cts, VarFiles:[], Version:, TFVersion: , BufferPeriod:(*BufferPeriodConfig)(nil), Enabled:true, Condition:&CatalogServicesConditionConfig{&CatalogServicesMonitorConfig{Regexp:^api$|^db$, Datacenter:, Namespace:, NodeMeta:map[], UseAsModuleInput:true}}, ModuleInput:{}}}, Services (deprecated):{}, TerraformProviders:{&map[local:(redacted)]}, BufferPeriod:&BufferPeriodConfig{Enabled:false, Min:0s, Max:0s},TLS:&CTSTLSConfig{CACert:, CAPath:, Cert:, Enabled:false, Key:, VerifyIncoming:false}}\"\n2024-11-15T19:28:08.100Z [INFO] ctrl: setting up controller: type=daemon\n2024-11-15T19:28:08.100Z [INFO] ctrl: initializing Consul client and testing connection\n2024-11-15T19:28:08.255Z [INFO] driver.terraform: skipping install, terraform already exists: tf_version=1.7.5 install_path=/home/runner/work/consul-terraform-sync/consul-terraform-sync/e2e\n2024-11-15T19:28:08.255Z [INFO] cli: initializing controller\n2024-11-15T19:28:08.255Z [INFO] ctrl: initializing driver factory\n2024-11-15T19:28:08.291Z [INFO] api: starting server: port=8558\n2024-11-15T19:28:08.293Z [DEBUG] registration: creating default HTTP health check: url=http://localhost:8558/v1/health\n2024-11-15T19:28:08.293Z [INFO] ctrl: executing all tasks once through\n2024-11-15T19:28:08.293Z [INFO] ctrl: running task once: task_name=cts_error_task\n2024-11-15T19:28:08.293Z [INFO] client.terraformcli: Terraform logging is set, Terraform logs will output with Consul-Terraform-Sync logs\n2024-11-15T19:28:08.293Z [INFO] driver.terraform: retrieved 0 Terraform handlers for task: task_name=cts_error_task\n2024-11-15T19:28:08.293Z [DEBUG] templates.tftmpl: creating file in root module for task: file_name=providers.auto.tfvars task_name=cts_error_task file_path=tmp_validate_errors/cts_error_task/providers.auto.tfvars\n2024-11-15T19:28:08.293Z [INFO] registration: registering Consul-Terraform-Sync as a service with Consul: id=cts-fv-az777-273 service_name=consul-terraform-sync\n2024-11-15T19:28:08.293Z [DEBUG] client.consul: registerin
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
e2e-tests-parts
|
1.24 KB |
|