Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unable to create CRD's of constraints and constraintTemplates while deploying Gatekeeper through Helm #3457

Open
shrikant-rajappan opened this issue Jul 22, 2024 · 3 comments
Labels
bug Something isn't working stale

Comments

@shrikant-rajappan
Copy link

shrikant-rajappan commented Jul 22, 2024

What steps did you take and what happened:
Deploying gatekeeper using helm and terraform plan runs fine but the apply fails with below error :

` Error: 2 errors occurred:
│ * MutatingWebhookConfiguration in version "v1" cannot be handled as a MutatingWebhookConfiguration: json: cannot unmarshal array into Go struct field LabelSelectorRequirement.webhooks.namespaceSelector.matchExpressions.values of type string
│ * ValidatingWebhookConfiguration in version "v1" cannot be handled as a ValidatingWebhookConfiguration: json: cannot unmarshal array into Go struct field LabelSelectorRequirement.webhooks.namespaceSelector.matchExpressions.values of type string

│ with helm_release.gatekeeper[0],
│ on gatekeeper.tf line 24, in resource "helm_release" "gatekeeper":
│ 24: resource "helm_release" "gatekeeper" {`

Here is the gatekeeper.tf :

`resource "helm_release" "gatekeeper" {
name = "gatekeeper"

version = var.gatekeeper_chart_version

also tried version = "v3.15.1"

set_list {
name = "validatingWebhookExemptNamespacesLabels.kubernetes\.io/metadata.name"
value = var.exempted_namespaces
}

set_list {
name = "mutatingWebhookExemptNamespacesLabels.kubernetes\.io/metadata.name"
value = var.exempted_namespaces
}

set_list {
name = "controllerManager.exemptNamespaces"
value = var.exempted_namespaces
}
.... other set_lists for prometheus and also if any of the two Webhooks fail due to gatekeeper being unable.
}
`

Constraints are defined in seperate folders and read using the "kubernetes_manifest" resource.

What did you expect to happen:

terraform Plan should have failed if there was an error in the configuration variables being sent to the helm_release. However only apply fails.

** Steps taken **

Enabled debug logs and shall upload in ensuing updates.
Tried changing the helm provider version as well as gatekeeper chart version without luck.

Environment:

  • Gatekeeper version: v3.16.1 and tried v3.15.1 as well
  • Kubernetes version: (use kubectl version):
@shrikant-rajappan shrikant-rajappan added the bug Something isn't working label Jul 22, 2024
@shrikant-rajappan
Copy link
Author

debug logs from terraform apply

`2024-07-22T12:48:00.997Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:00 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2024-07-22T12:48:00.997Z
2024-07-22T12:48:00.997Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:00 [DEBUG] [resourceReleaseCreate: gatekeeper] Getting chart: timestamp=2024-07-22T12:48:00.997Z
2024-07-22T12:48:01.132Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:01 [DEBUG] Chart dependencies are up to date.: timestamp=2024-07-22T12:48:01.132Z
2024-07-22T12:48:01.133Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:01 [DEBUG] [resourceReleaseCreate: gatekeeper] Preparing for installation: timestamp=2024-07-22T12:48:01.132Z
2024-07-22T12:48:01.133Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:01 ---[ values.yaml ]-----------------------------------
controllerManager:
exemptNamespaces:

  • default
  • kube-public
  • kube-node-lease
  • kube-system
  • istio-system
  • grafana-system
  • twistlock-system
  • tempo-system
  • gatekeeper-system
    mutatingWebhookExemptNamespacesLabels:
    kubernetes.io/metadata:
    name:
    • default
    • kube-public
    • kube-node-lease
    • kube-system
    • istio-system
    • grafana-system
    • twistlock-system
    • tempo-system
    • gatekeeper-system
      mutatingWebhookFailurePolicy: Ignore
      podAnnotations:
      prometheus.io/path: /metrics
      prometheus.io/port: "8888"
      prometheus.io/scrape: "true"
      validatingWebhookExemptNamespacesLabels:
      kubernetes.io/metadata:
      name:
    • default
    • kube-public
    • kube-node-lease
    • kube-system
    • istio-system
    • grafana-system
    • twistlock-system
    • tempo-system
    • gatekeeper-system
      validatingWebhookFailurePolicy: Ignore: timestamp=2024-07-22T12:48:01.133Z
      2024-07-22T12:48:01.133Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:01 [DEBUG] [resourceReleaseCreate: gatekeeper] Installing chart: timestamp=2024-07-22T12:48:01.133Z
      2024-07-22T12:48:01.568Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:01 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:01.568Z
      2024-07-22T12:48:01.799Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:01 [DEBUG] CRD assign.mutations.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:01.799Z
      2024-07-22T12:48:02.018Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:02 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:02.017Z
      2024-07-22T12:48:02.172Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:02 [DEBUG] CRD assignimage.mutations.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:02.172Z
      2024-07-22T12:48:02.405Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:02 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:02.405Z
      2024-07-22T12:48:02.575Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:02 [DEBUG] CRD assignmetadata.mutations.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:02.574Z
      2024-07-22T12:48:02.907Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:02 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:02.906Z
      2024-07-22T12:48:03.059Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:03 [DEBUG] CRD configs.config.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:03.059Z
      2024-07-22T12:48:03.448Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:03 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:03.448Z
      2024-07-22T12:48:03.596Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:03 [DEBUG] CRD constraintpodstatuses.status.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:03.596Z
      2024-07-22T12:48:03.783Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:03 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:03.783Z
      2024-07-22T12:48:03.835Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:03 [DEBUG] CRD constrainttemplates.templates.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:03.835Z
      2024-07-22T12:48:03.953Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:03 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:03.953Z
      2024-07-22T12:48:04.000Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] CRD constrainttemplatepodstatuses.status.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:04.000Z
      2024-07-22T12:48:04.126Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:04.126Z
      2024-07-22T12:48:04.171Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] CRD expansiontemplate.expansion.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:04.170Z
      2024-07-22T12:48:04.296Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:04.296Z
      2024-07-22T12:48:04.371Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] CRD expansiontemplatepodstatuses.status.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:04.371Z
      2024-07-22T12:48:04.492Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:04.492Z
      2024-07-22T12:48:04.607Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] CRD modifyset.mutations.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:04.607Z
      2024-07-22T12:48:04.732Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:04.732Z
      2024-07-22T12:48:04.778Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] CRD mutatorpodstatuses.status.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:04.778Z
      2024-07-22T12:48:04.897Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:04.897Z
      2024-07-22T12:48:04.940Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:04 [DEBUG] CRD providers.externaldata.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:04.940Z
      2024-07-22T12:48:05.056Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:05 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:05.055Z
      2024-07-22T12:48:05.102Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:05 [DEBUG] CRD syncsets.syncset.gatekeeper.sh is already present. Skipping.: timestamp=2024-07-22T12:48:05.102Z
      2024-07-22T12:48:08.694Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:08 [DEBUG] Starting delete for "gatekeeper-admin-upgrade-crds" ServiceAccount: timestamp=2024-07-22T12:48:08.694Z
      2024-07-22T12:48:08.739Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:08 [DEBUG] Ignoring delete failure for "gatekeeper-admin-upgrade-crds" /v1, Kind=ServiceAccount: serviceaccounts "gatekeeper-admin-upgrade-crds" not found: timestamp=2024-07-22T12:48:08.739Z
      2024-07-22T12:48:09.144Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:09 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:09.144Z
      2024-07-22T12:48:09.334Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:09 [DEBUG] Starting delete for "gatekeeper-admin-upgrade-crds" ClusterRole: timestamp=2024-07-22T12:48:09.334Z
      2024-07-22T12:48:10.451Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:10 [DEBUG] Ignoring delete failure for "gatekeeper-admin-upgrade-crds" rbac.authorization.k8s.io/v1, Kind=ClusterRole: clusterroles.rbac.authorization.k8s.io "gatekeeper-admin-upgrade-crds" not found: timestamp=2024-07-22T12:48:10.451Z
      2024-07-22T12:48:10.925Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:10 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:10.924Z
      helm_release.gatekeeper[0]: Still creating... [10s elapsed]
      2024-07-22T12:48:11.131Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:11 [DEBUG] Starting delete for "gatekeeper-admin-upgrade-crds" ClusterRoleBinding: timestamp=2024-07-22T12:48:11.131Z
      2024-07-22T12:48:11.188Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:11 [DEBUG] Ignoring delete failure for "gatekeeper-admin-upgrade-crds" rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding: clusterrolebindings.rbac.authorization.k8s.io "gatekeeper-admin-upgrade-crds" not found: timestamp=2024-07-22T12:48:11.188Z
      2024-07-22T12:48:11.465Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:11 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:11.465Z
      2024-07-22T12:48:11.668Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:11 [DEBUG] Starting delete for "gatekeeper-update-crds-hook" Job: timestamp=2024-07-22T12:48:11.667Z
      2024-07-22T12:48:11.726Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:11 [DEBUG] Ignoring delete failure for "gatekeeper-update-crds-hook" batch/v1, Kind=Job: jobs.batch "gatekeeper-update-crds-hook" not found: timestamp=2024-07-22T12:48:11.726Z
      2024-07-22T12:48:12.466Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:12 [DEBUG] creating 1 resource(s): timestamp=2024-07-22T12:48:12.466Z
      2024-07-22T12:48:12.775Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:12 [DEBUG] Watching for changes to Job gatekeeper-update-crds-hook with timeout of 5m0s: timestamp=2024-07-22T12:48:12.774Z
      2024-07-22T12:48:12.840Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:12 [DEBUG] Add/Modify event for gatekeeper-update-crds-hook: ADDED: timestamp=2024-07-22T12:48:12.840Z
      2024-07-22T12:48:12.840Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:12 [DEBUG] gatekeeper-update-crds-hook: Jobs active: 0, jobs failed: 0, jobs succeeded: 0: timestamp=2024-07-22T12:48:12.840Z
      2024-07-22T12:48:13.231Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:13 [DEBUG] Add/Modify event for gatekeeper-update-crds-hook: MODIFIED: timestamp=2024-07-22T12:48:13.231Z
      2024-07-22T12:48:13.231Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:13 [DEBUG] gatekeeper-update-crds-hook: Jobs active: 1, jobs failed: 0, jobs succeeded: 0: timestamp=2024-07-22T12:48:13.231Z
      2024-07-22T12:48:18.595Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:18 [DEBUG] Add/Modify event for gatekeeper-update-crds-hook: MODIFIED: timestamp=2024-07-22T12:48:18.595Z
      2024-07-22T12:48:18.595Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:18 [DEBUG] gatekeeper-update-crds-hook: Jobs active: 0, jobs failed: 0, jobs succeeded: 0: timestamp=2024-07-22T12:48:18.595Z
      2024-07-22T12:48:18.665Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:18 [DEBUG] Add/Modify event for gatekeeper-update-crds-hook: MODIFIED: timestamp=2024-07-22T12:48:18.665Z
      2024-07-22T12:48:18.825Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:18 [DEBUG] Starting delete for "gatekeeper-admin-upgrade-crds" ServiceAccount: timestamp=2024-07-22T12:48:18.825Z
      2024-07-22T12:48:19.012Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:19 [DEBUG] Starting delete for "gatekeeper-admin-upgrade-crds" ClusterRole: timestamp=2024-07-22T12:48:19.012Z
      2024-07-22T12:48:19.181Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:19 [DEBUG] Starting delete for "gatekeeper-admin-upgrade-crds" ClusterRoleBinding: timestamp=2024-07-22T12:48:19.181Z
      2024-07-22T12:48:19.358Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:19 [DEBUG] Starting delete for "gatekeeper-update-crds-hook" Job: timestamp=2024-07-22T12:48:19.358Z
      2024-07-22T12:48:19.416Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:19 [DEBUG] creating 13 resource(s): timestamp=2024-07-22T12:48:19.416Z
      2024-07-22T12:48:20.224Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] [resourceReleaseExists: gatekeeper] Start: timestamp=2024-07-22T12:48:20.224Z
      2024-07-22T12:48:20.224Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] [INFO] GetHelmConfiguration start: timestamp=2024-07-22T12:48:20.224Z
      2024-07-22T12:48:20.224Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [INFO] Successfully initialized kubernetes config: timestamp=2024-07-22T12:48:20.224Z
      2024-07-22T12:48:20.224Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] [INFO] GetHelmConfiguration success: timestamp=2024-07-22T12:48:20.224Z
      2024-07-22T12:48:20.224Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] gatekeeper getRelease wait for lock: timestamp=2024-07-22T12:48:20.224Z
      2024-07-22T12:48:20.224Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] gatekeeper getRelease got lock, started: timestamp=2024-07-22T12:48:20.224Z
      2024-07-22T12:48:20.224Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] gatekeeper getRelease post action created: timestamp=2024-07-22T12:48:20.224Z
      2024-07-22T12:48:20.300Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] gatekeeper getRelease post run: timestamp=2024-07-22T12:48:20.300Z
      2024-07-22T12:48:20.300Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] gatekeeper getRelease done: timestamp=2024-07-22T12:48:20.300Z
      2024-07-22T12:48:20.300Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] [resourceReleaseExists: gatekeeper] Done: timestamp=2024-07-22T12:48:20.300Z
      2024-07-22T12:48:20.300Z [INFO] provider.terraform-provider-helm_v2.12.1_x5: 2024/07/22 12:48:20 [DEBUG] [resourceReleaseCreate: gatekeeper] Release was created but returned an error: timestamp=2024-07-22T12:48:20.300Z
      2024-07-22T12:48:20.301Z [WARN] provider.terraform-provider-helm_v2.12.1_x5: Response contains warning diagnostic: diagnostic_detail= diagnostic_summary="Helm release "gatekeeper" was created but has a failed status. Use the helm command to investigate the error, correct it, then run Terraform again." tf_provider_addr=provider tf_resource_type=helm_release @caller=github.com/hashicorp/[email protected]/tfprotov5/internal/diag/diagnostics.go:60 @module=sdk.proto diagnostic_severity=WARNING tf_proto_version=5.4 tf_req_id=271d2ca2-8a13-ba73-e2ff-e6b9a2964870 tf_rpc=ApplyResourceChange timestamp=2024-07-22T12:48:20.301Z
      2024-07-22T12:48:20.301Z [ERROR] provider.terraform-provider-helm_v2.12.1_x5: Response contains error diagnostic: tf_proto_version=5.4 tf_provider_addr=provider tf_resource_type=helm_release diagnostic_detail= diagnostic_severity=ERROR diagnostic_summary="2 errors occurred:
    • MutatingWebhookConfiguration in version "v1" cannot be handled as a MutatingWebhookConfiguration: json: cannot unmarshal array into Go struct field LabelSelectorRequirement.webhooks.namespaceSelector.matchExpressions.values of type string
    • ValidatingWebhookConfiguration in version "v1" cannot be handled as a ValidatingWebhookConfiguration: json: cannot unmarshal array into Go struct field LabelSelectorRequirement.webhooks.namespaceSelector.matchExpressions.values of type string
      " tf_req_id=271d2ca2-8a13-ba73-e2ff-e6b9a2964870 tf_rpc=ApplyResourceChange @caller=github.com/hashicorp/[email protected]/tfprotov5/internal/diag/diagnostics.go:58 @module=sdk.proto timestamp=2024-07-22T12:48:20.301Z

      │ Warning: Helm release "gatekeeper" was created but has a failed status. Use the helm command to investigate the error, correct it, then run Terraform again.

      │ with helm_release.gatekeeper[0],
      │ on gatekeeper.tf line 24, in resource "helm_release" "gatekeeper":
      │ 24: resource "helm_release" "gatekeeper" {



      │ Warning: Experimental feature "module_variable_optional_attrs" is active

      │ on versions.tf line 2, in terraform:
      │ 2: experiments = [module_variable_optional_attrs]

      │ Experimental features are subject to breaking changes in future minor or
      │ patch releases, based on feedback.

      │ If you have feedback on the design of this feature, please open a GitHub
      │ issue to discuss it.


      │ Error: 2 errors occurred:
      │ * MutatingWebhookConfiguration in version "v1" cannot be handled as a MutatingWebhookConfiguration: json: cannot unmarshal array into Go struct field LabelSelectorRequirement.webhooks.namespaceSelector.matchExpressions.values of type string
      │ * ValidatingWebhookConfiguration in version "v1" cannot be handled as a ValidatingWebhookConfiguration: json: cannot unmarshal array into Go struct field LabelSelectorRequirement.webhooks.namespaceSelector.matchExpressions.values of type string



      │ with helm_release.gatekeeper[0],
      │ on gatekeeper.tf line 24, in resource "helm_release" "gatekeeper":
      │ 24: resource "helm_release" "gatekeeper" {


      2024-07-22T12:48:20.587Z [DEBUG] provider.stdio: received EOF, stopping recv loop: err="rpc error: code = Unavailable desc = transport is closing"
      2024-07-22T12:48:20.595Z [DEBUG] provider: plugin process exited: path=.terraform/providers/registry.terraform.io/hashicorp/helm/2.12.1/linux_amd64/terraform-provider-helm_v2.12.1_x5 pid=3035
      2024-07-22T12:48:20.595Z [DEBUG] provider: plugin exited`

@shrikant-rajappan
Copy link
Author

Bumping this for some traction !!

Copy link

stale bot commented Sep 29, 2024

This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 14 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale label Sep 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working stale
Projects
None yet
Development

No branches or pull requests

1 participant