Skip to content

cloudflare_zone_setting perpetual diff and/or crashing provider #6436

@adamwolfe-tc

Description

@adamwolfe-tc

Confirmation

  • This is a bug with an existing resource and is not a feature request or enhancement. Feature requests should be submitted with Cloudflare Support or your account team.
  • I have searched the issue tracker and my issue isn't already found.
  • I have replicated my issue using the latest version of the provider and it is still present.

Terraform and Cloudflare provider version

opentofu 1.9.4, 1.10.7
terraform 1.13.5

cloudflare provider versions: 5.12.0 and 5.8.4

Affected resource(s)

  • HTTP Strict Transport Security (HSTS) (maybe others within cloudflare_zone_setting)

Terraform configuration files

terraform {
  required_providers {
    cloudflare = {
      source  = "cloudflare/cloudflare"
      version = ">= 5"
    }
  }
}

provider "cloudflare" {
  api_token = "foo"
}

resource "cloudflare_zone_setting" "security_header" {
  zone_id    = "bar"
  setting_id = "security_header"
  # values don't really matter from what i've experienced
  value = {
    enabled            = true
    max_age            = 31536000
    include_subdomains = true
    nosniff            = false
  }
}

Link to debug output

https://gist.github.com/adamwolfe-tc/781bc0727ee8566e30c2758729b84dca

Panic output

│ Error: Request cancelled
│
│ The plugin6.(*GRPCProvider).ReadResource request was cancelled.
╵

Stack trace from the terraform-provider-cloudflare_v5.12.0 plugin:

panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x2 addr=0x6 pc=0x100700a04]

goroutine 22 [running]:
math/big.(*Float).Int(0x0, 0x101?)
        math/big/float.go:1085 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/types.intValue({0x105042188?, 0x140008811a0?})
        github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:38 +0x1e8
github.com/cloudflare/terraform-provider-cloudflare/internal/types.IntValue({0x105042188, 0x140008811a0})
        github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:48 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x105042188, 0x140008811a0}, {0x105042188, 0x14000881160})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:111 +0x1a8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals.func2({0x105042188?, 0x140008811a0?}, {0x105042188?, 0x14000881160?})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:149 +0x54
maps.EqualFunc[...](0x1400031ee70, 0x1400078be60?, 0x1400009e998)
        maps/maps.go:36 +0xe8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x105003908, 0x1400031ef00}, {0x105003908, 0x1400031ee70})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:147 +0x2e0
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x1050422a8, 0x1400031ef48}, {0x1050422a8, 0x1400031eea0})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:107 +0x3f8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.NormalizedDynamicValue.DynamicSemanticEquals(...)
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:164
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEqualityDynamic({0x104ffca68, 0x1400078bdd0}, {{{0x14000881110, 0x1, 0x1}}, {0x1050422a8, 0x1400031eea0}, {0x1050422a8, 0x1400031ef30}}, 0x1400009efa0)
        github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality_dynamic.go:61 +0x3c8
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEquality({0x104ffca68, 0x140001507e0}, {{{0x14000881110, 0x1, 0x1}}, {0x1050422a8, 0x1400031eea0}, {0x1050422a8, 0x1400031ef30}}, 0x1400009efa0)
        github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:87 +0x434
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.SchemaSemanticEquality({0x104ffca68, 0x140001507e0}, {{{0x1034f2c89, 0x5}, {0x1050c4df0, 0x140003f2d20}, {{0x1050868b0, 0x1400078a810}, {0x104270040, 0x1400078a5a0}}}, ...}, ...)
        github.com/hashicorp/[email protected]/internal/fwserver/schema_semantic_equality.go:80 +0x214
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.(*Server).ReadResource(0x140001ad688, {0x104ffca68, 0x140001507e0}, 0x140003f3810, 0x1400009f5d0)
        github.com/hashicorp/[email protected]/internal/fwserver/server_readresource.go:217 +0xe50
github.com/hashicorp/terraform-plugin-framework/internal/proto6server.(*Server).ReadResource(0x140001ad688, {0x104ffca68?, 0x140001506f0?}, 0x140003f3770)
        github.com/hashicorp/[email protected]/internal/proto6server/server_readresource.go:71 +0x438
github.com/hashicorp/terraform-plugin-go/tfprotov6/tf6server.(*server).ReadResource(0x140002dabe0, {0x104ffca68?, 0x1400014bc50?}, 0x140002e2a80)
        github.com/hashicorp/[email protected]/tfprotov6/tf6server/server.go:860 +0x21c
github.com/hashicorp/terraform-plugin-go/tfprotov6/internal/tfplugin6._Provider_ReadResource_Handler({0x104f001c0, 0x140002dabe0}, {0x104ffca68, 0x1400014bc50}, 0x14000138380, 0x0)
        github.com/hashicorp/[email protected]/tfprotov6/internal/tfplugin6/tfplugin6_grpc.pb.go:651 +0x1c0
google.golang.org/grpc.(*Server).processUnaryRPC(0x1400024c200, {0x104ffca68, 0x1400014bbc0}, 0x14000788a80, 0x140003c49c0, 0x108a9f898, 0x0)
        google.golang.org/[email protected]/server.go:1405 +0xca8
google.golang.org/grpc.(*Server).handleStream(0x1400024c200, {0x104ffd3a8, 0x140003ca1a0}, 0x14000788a80)
        google.golang.org/[email protected]/server.go:1815 +0x910
google.golang.org/grpc.(*Server).serveStreams.func2.1()
        google.golang.org/[email protected]/server.go:1035 +0x84
created by google.golang.org/grpc.(*Server).serveStreams.func2 in goroutine 17
        google.golang.org/[email protected]/server.go:1046 +0x13c

Error: The terraform-provider-cloudflare_v5.12.0 plugin crashed!

This is always indicative of a bug within the plugin. It would be immensely
helpful if you could report the crash with the plugin's maintainers so that it
can be fixed. The output above should help diagnose the issue.

Expected output

after an apply, resources should be in alignment, plans showing no drift (and not crash on subsequent read/plan)

Actual output

the output is semi-random. sometimes it crashes, sometimes it shows a delta with null in state. in my example i was lucky enough to get a couple "good" plans that show the delta from state with null and a couple crashes in no discernible order. it is also worth noting the successful apply doesn't change anything on the cloudflare side.

$ tofu init

Initializing the backend...

Initializing provider plugins...
- Finding cloudflare/cloudflare versions matching ">= 5.0.0"...
- Installing cloudflare/cloudflare v5.12.0...
- Installed cloudflare/cloudflare v5.12.0 (signed, key ID C76001609EE3B136)

Providers are signed by their developers.
If you'd like to know more about provider signing, you can read about it here:
https://opentofu.org/docs/cli/plugins/signing/

OpenTofu has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that OpenTofu can guarantee to make the same selections by default when
you run "tofu init" in the future.

OpenTofu has been successfully initialized!

You may now begin working with OpenTofu. Try running "tofu plan" to see
any changes that are required for your infrastructure. All OpenTofu commands
should now work.

If you ever set or change modules or backend configuration for OpenTofu,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.

$ tofu apply

cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]

OpenTofu used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  ~ update in-place

OpenTofu will perform the following actions:

  # cloudflare_zone_setting.security_header will be updated in-place
  ~ resource "cloudflare_zone_setting" "security_header" {
      ~ editable       = true -> (known after apply)
      + enabled        = (known after apply)
        id             = "security_header"
      ~ modified_on    = "2021-08-13T15:29:30Z" -> (known after apply)
      + time_remaining = (known after apply)
      ~ value          = {
          + enabled                   = true
          + include_subdomains        = true
          + max_age                   = 31536000
          + nosniff                   = false
          - strict_transport_security = {
              - enabled            = true
              - include_subdomains = true
              - max_age            = 15552000
              - nosniff            = false
              - preload            = false
            }
        }
        # (2 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Do you want to perform these actions?
  OpenTofu will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

cloudflare_zone_setting.security_header: Modifying... [id=security_header]
cloudflare_zone_setting.security_header: Modifications complete after 2s [id=security_header]

Apply complete! Resources: 0 added, 1 changed, 0 destroyed.

$ tofu apply

cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]
╷
│ Error: Request cancelled
│
│ The plugin6.(*GRPCProvider).ReadResource request was cancelled.
╵

Stack trace from the terraform-provider-cloudflare_v5.12.0 plugin:

panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x2 addr=0x6 pc=0x100700a04]

goroutine 22 [running]:
math/big.(*Float).Int(0x0, 0x101?)
        math/big/float.go:1085 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/types.intValue({0x105042188?, 0x140008811a0?})
        github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:38 +0x1e8
github.com/cloudflare/terraform-provider-cloudflare/internal/types.IntValue({0x105042188, 0x140008811a0})
        github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:48 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x105042188, 0x140008811a0}, {0x105042188, 0x14000881160})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:111 +0x1a8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals.func2({0x105042188?, 0x140008811a0?}, {0x105042188?, 0x14000881160?})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:149 +0x54
maps.EqualFunc[...](0x1400031ee70, 0x1400078be60?, 0x1400009e998)
        maps/maps.go:36 +0xe8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x105003908, 0x1400031ef00}, {0x105003908, 0x1400031ee70})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:147 +0x2e0
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x1050422a8, 0x1400031ef48}, {0x1050422a8, 0x1400031eea0})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:107 +0x3f8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.NormalizedDynamicValue.DynamicSemanticEquals(...)
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:164
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEqualityDynamic({0x104ffca68, 0x1400078bdd0}, {{{0x14000881110, 0x1, 0x1}}, {0x1050422a8, 0x1400031eea0}, {0x1050422a8, 0x1400031ef30}}, 0x1400009efa0)
        github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality_dynamic.go:61 +0x3c8
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEquality({0x104ffca68, 0x140001507e0}, {{{0x14000881110, 0x1, 0x1}}, {0x1050422a8, 0x1400031eea0}, {0x1050422a8, 0x1400031ef30}}, 0x1400009efa0)
        github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:87 +0x434
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.SchemaSemanticEquality({0x104ffca68, 0x140001507e0}, {{{0x1034f2c89, 0x5}, {0x1050c4df0, 0x140003f2d20}, {{0x1050868b0, 0x1400078a810}, {0x104270040, 0x1400078a5a0}}}, ...}, ...)
        github.com/hashicorp/[email protected]/internal/fwserver/schema_semantic_equality.go:80 +0x214
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.(*Server).ReadResource(0x140001ad688, {0x104ffca68, 0x140001507e0}, 0x140003f3810, 0x1400009f5d0)
        github.com/hashicorp/[email protected]/internal/fwserver/server_readresource.go:217 +0xe50
github.com/hashicorp/terraform-plugin-framework/internal/proto6server.(*Server).ReadResource(0x140001ad688, {0x104ffca68?, 0x140001506f0?}, 0x140003f3770)
        github.com/hashicorp/[email protected]/internal/proto6server/server_readresource.go:71 +0x438
github.com/hashicorp/terraform-plugin-go/tfprotov6/tf6server.(*server).ReadResource(0x140002dabe0, {0x104ffca68?, 0x1400014bc50?}, 0x140002e2a80)
        github.com/hashicorp/[email protected]/tfprotov6/tf6server/server.go:860 +0x21c
github.com/hashicorp/terraform-plugin-go/tfprotov6/internal/tfplugin6._Provider_ReadResource_Handler({0x104f001c0, 0x140002dabe0}, {0x104ffca68, 0x1400014bc50}, 0x14000138380, 0x0)
        github.com/hashicorp/[email protected]/tfprotov6/internal/tfplugin6/tfplugin6_grpc.pb.go:651 +0x1c0
google.golang.org/grpc.(*Server).processUnaryRPC(0x1400024c200, {0x104ffca68, 0x1400014bbc0}, 0x14000788a80, 0x140003c49c0, 0x108a9f898, 0x0)
        google.golang.org/[email protected]/server.go:1405 +0xca8
google.golang.org/grpc.(*Server).handleStream(0x1400024c200, {0x104ffd3a8, 0x140003ca1a0}, 0x14000788a80)
        google.golang.org/[email protected]/server.go:1815 +0x910
google.golang.org/grpc.(*Server).serveStreams.func2.1()
        google.golang.org/[email protected]/server.go:1035 +0x84
created by google.golang.org/grpc.(*Server).serveStreams.func2 in goroutine 17
        google.golang.org/[email protected]/server.go:1046 +0x13c

Error: The terraform-provider-cloudflare_v5.12.0 plugin crashed!

This is always indicative of a bug within the plugin. It would be immensely
helpful if you could report the crash with the plugin's maintainers so that it
can be fixed. The output above should help diagnose the issue.

$ tofu apply

cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]

OpenTofu used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  ~ update in-place

OpenTofu will perform the following actions:

  # cloudflare_zone_setting.security_header will be updated in-place
  ~ resource "cloudflare_zone_setting" "security_header" {
      ~ editable       = true -> (known after apply)
      + enabled        = (known after apply)
        id             = "security_header"
      ~ modified_on    = "2025-11-07T15:06:36Z" -> (known after apply)
      + time_remaining = (known after apply)
      ~ value          = {
          ~ enabled            = null -> true
          ~ include_subdomains = null -> true
          ~ max_age            = null -> 31536000
          ~ nosniff            = null -> false
        }
        # (2 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Do you want to perform these actions?
  OpenTofu will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

cloudflare_zone_setting.security_header: Modifying... [id=security_header]
cloudflare_zone_setting.security_header: Modifications complete after 1s [id=security_header]

Apply complete! Resources: 0 added, 1 changed, 0 destroyed.

$ tofu apply

cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]

OpenTofu used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  ~ update in-place

OpenTofu will perform the following actions:

  # cloudflare_zone_setting.security_header will be updated in-place
  ~ resource "cloudflare_zone_setting" "security_header" {
      ~ editable       = true -> (known after apply)
      + enabled        = (known after apply)
        id             = "security_header"
      ~ modified_on    = "2025-11-07T15:08:23Z" -> (known after apply)
      + time_remaining = (known after apply)
      ~ value          = {
          ~ enabled            = null -> true
          ~ include_subdomains = null -> true
          ~ max_age            = null -> 31536000
          ~ nosniff            = null -> false
        }
        # (2 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Do you want to perform these actions?
  OpenTofu will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

cloudflare_zone_setting.security_header: Modifying... [id=security_header]
cloudflare_zone_setting.security_header: Modifications complete after 1s [id=security_header]

Apply complete! Resources: 0 added, 1 changed, 0 destroyed.

$ tofu apply

cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]
╷
│ Error: Plugin did not respond
│
│ The plugin encountered an error, and failed to respond to the plugin6.(*GRPCProvider).ReadResource call. The plugin logs may contain more details.
╵

Stack trace from the terraform-provider-cloudflare_v5.12.0 plugin:

panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x2 addr=0x6 pc=0x104464a04]

goroutine 52 [running]:
math/big.(*Float).Int(0x0, 0x101?)
        math/big/float.go:1085 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/types.intValue({0x108da6188?, 0x1400003f910?})
        github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:38 +0x1e8
github.com/cloudflare/terraform-provider-cloudflare/internal/types.IntValue({0x108da6188, 0x1400003f910})
        github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:48 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x108d60a68, 0x140004998f0}, {0x108da6188, 0x1400003f910}, {0x108da6188, 0x1400003f8d0})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:111 +0x1a8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals.func2({0x108da6188?, 0x1400003f910?}, {0x108da6188?, 0x1400003f8d0?})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:149 +0x54
maps.EqualFunc[...](0x140003c8978, 0x14000499980?, 0x14000452998)
        maps/maps.go:36 +0xe8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x108d60a68, 0x140004998f0}, {0x108d67908, 0x140003c8a08}, {0x108d67908, 0x140003c8978})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:147 +0x2e0
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x108d60a68, 0x140004998f0}, {0x108da62a8, 0x140003c8a50}, {0x108da62a8, 0x140003c89a8})
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:107 +0x3f8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.NormalizedDynamicValue.DynamicSemanticEquals(...)
        github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:164
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEqualityDynamic({0x108d60a68, 0x140004998f0}, {{{0x1400003f880, 0x1, 0x1}}, {0x108da62a8, 0x140003c89a8}, {0x108da62a8, 0x140003c8a38}}, 0x14000452fa0)
        github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality_dynamic.go:61 +0x3c8
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEquality({0x108d60a68, 0x140002793b0}, {{{0x1400003f880, 0x1, 0x1}}, {0x108da62a8, 0x140003c89a8}, {0x108da62a8, 0x140003c8a38}}, 0x14000452fa0)
        github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:87 +0x434
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.SchemaSemanticEquality({0x108d60a68, 0x140002793b0}, {{{0x107256c89, 0x5}, {0x108e28df0, 0x140004ac550}, {{0x108dea8b0, 0x14000498330}, {0x107fd4040, 0x1400041dec0}}}, ...}, ...)
        github.com/hashicorp/[email protected]/internal/fwserver/schema_semantic_equality.go:80 +0x214
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.(*Server).ReadResource(0x140001ad688, {0x108d60a68, 0x140002793b0}, 0x140004ac140, 0x140004535d0)
        github.com/hashicorp/[email protected]/internal/fwserver/server_readresource.go:217 +0xe50
github.com/hashicorp/terraform-plugin-framework/internal/proto6server.(*Server).ReadResource(0x140001ad688, {0x108d60a68?, 0x140002792c0?}, 0x140004acfa0)
        github.com/hashicorp/[email protected]/internal/proto6server/server_readresource.go:71 +0x438
github.com/hashicorp/terraform-plugin-go/tfprotov6/tf6server.(*server).ReadResource(0x140002dabe0, {0x108d60a68?, 0x140002788a0?}, 0x140002e2690)
        github.com/hashicorp/[email protected]/tfprotov6/tf6server/server.go:860 +0x21c
github.com/hashicorp/terraform-plugin-go/tfprotov6/internal/tfplugin6._Provider_ReadResource_Handler({0x108c641c0, 0x140002dabe0}, {0x108d60a68, 0x140002788a0}, 0x14000035d80, 0x0)
        github.com/hashicorp/[email protected]/tfprotov6/internal/tfplugin6/tfplugin6_grpc.pb.go:651 +0x1c0
google.golang.org/grpc.(*Server).processUnaryRPC(0x1400024c200, {0x108d60a68, 0x14000278810}, 0x1400045e720, 0x140003c49c0, 0x10c803898, 0x0)
        google.golang.org/[email protected]/server.go:1405 +0xca8
google.golang.org/grpc.(*Server).handleStream(0x1400024c200, {0x108d613a8, 0x14000472000}, 0x1400045e720)
        google.golang.org/[email protected]/server.go:1815 +0x910
google.golang.org/grpc.(*Server).serveStreams.func2.1()
        google.golang.org/[email protected]/server.go:1035 +0x84
created by google.golang.org/grpc.(*Server).serveStreams.func2 in goroutine 20
        google.golang.org/[email protected]/server.go:1046 +0x13c

Error: The terraform-provider-cloudflare_v5.12.0 plugin crashed!

This is always indicative of a bug within the plugin. It would be immensely
helpful if you could report the crash with the plugin's maintainers so that it
can be fixed. The output above should help diagnose the issue.

Steps to reproduce

with the example code above:

init
plan
apply
plan or apply again

Additional factoids

likely related to #6315 but with my testing pre-5.9 is also affected.

References

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/bugCategorizes issue or PR as related to a bug.version/5Categorizes issue or PR as related to version 5 of the provider.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions