-
Notifications
You must be signed in to change notification settings - Fork 759
Closed
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.version/5Categorizes issue or PR as related to version 5 of the provider.Categorizes issue or PR as related to version 5 of the provider.
Description
Confirmation
- This is a bug with an existing resource and is not a feature request or enhancement. Feature requests should be submitted with Cloudflare Support or your account team.
- I have searched the issue tracker and my issue isn't already found.
- I have replicated my issue using the latest version of the provider and it is still present.
Terraform and Cloudflare provider version
opentofu 1.9.4, 1.10.7
terraform 1.13.5
cloudflare provider versions: 5.12.0 and 5.8.4
Affected resource(s)
- HTTP Strict Transport Security (HSTS) (maybe others within
cloudflare_zone_setting)
Terraform configuration files
terraform {
required_providers {
cloudflare = {
source = "cloudflare/cloudflare"
version = ">= 5"
}
}
}
provider "cloudflare" {
api_token = "foo"
}
resource "cloudflare_zone_setting" "security_header" {
zone_id = "bar"
setting_id = "security_header"
# values don't really matter from what i've experienced
value = {
enabled = true
max_age = 31536000
include_subdomains = true
nosniff = false
}
}Link to debug output
https://gist.github.com/adamwolfe-tc/781bc0727ee8566e30c2758729b84dca
Panic output
│ Error: Request cancelled
│
│ The plugin6.(*GRPCProvider).ReadResource request was cancelled.
╵
Stack trace from the terraform-provider-cloudflare_v5.12.0 plugin:
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x2 addr=0x6 pc=0x100700a04]
goroutine 22 [running]:
math/big.(*Float).Int(0x0, 0x101?)
math/big/float.go:1085 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/types.intValue({0x105042188?, 0x140008811a0?})
github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:38 +0x1e8
github.com/cloudflare/terraform-provider-cloudflare/internal/types.IntValue({0x105042188, 0x140008811a0})
github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:48 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x105042188, 0x140008811a0}, {0x105042188, 0x14000881160})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:111 +0x1a8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals.func2({0x105042188?, 0x140008811a0?}, {0x105042188?, 0x14000881160?})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:149 +0x54
maps.EqualFunc[...](0x1400031ee70, 0x1400078be60?, 0x1400009e998)
maps/maps.go:36 +0xe8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x105003908, 0x1400031ef00}, {0x105003908, 0x1400031ee70})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:147 +0x2e0
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x1050422a8, 0x1400031ef48}, {0x1050422a8, 0x1400031eea0})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:107 +0x3f8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.NormalizedDynamicValue.DynamicSemanticEquals(...)
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:164
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEqualityDynamic({0x104ffca68, 0x1400078bdd0}, {{{0x14000881110, 0x1, 0x1}}, {0x1050422a8, 0x1400031eea0}, {0x1050422a8, 0x1400031ef30}}, 0x1400009efa0)
github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality_dynamic.go:61 +0x3c8
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEquality({0x104ffca68, 0x140001507e0}, {{{0x14000881110, 0x1, 0x1}}, {0x1050422a8, 0x1400031eea0}, {0x1050422a8, 0x1400031ef30}}, 0x1400009efa0)
github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:87 +0x434
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.SchemaSemanticEquality({0x104ffca68, 0x140001507e0}, {{{0x1034f2c89, 0x5}, {0x1050c4df0, 0x140003f2d20}, {{0x1050868b0, 0x1400078a810}, {0x104270040, 0x1400078a5a0}}}, ...}, ...)
github.com/hashicorp/[email protected]/internal/fwserver/schema_semantic_equality.go:80 +0x214
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.(*Server).ReadResource(0x140001ad688, {0x104ffca68, 0x140001507e0}, 0x140003f3810, 0x1400009f5d0)
github.com/hashicorp/[email protected]/internal/fwserver/server_readresource.go:217 +0xe50
github.com/hashicorp/terraform-plugin-framework/internal/proto6server.(*Server).ReadResource(0x140001ad688, {0x104ffca68?, 0x140001506f0?}, 0x140003f3770)
github.com/hashicorp/[email protected]/internal/proto6server/server_readresource.go:71 +0x438
github.com/hashicorp/terraform-plugin-go/tfprotov6/tf6server.(*server).ReadResource(0x140002dabe0, {0x104ffca68?, 0x1400014bc50?}, 0x140002e2a80)
github.com/hashicorp/[email protected]/tfprotov6/tf6server/server.go:860 +0x21c
github.com/hashicorp/terraform-plugin-go/tfprotov6/internal/tfplugin6._Provider_ReadResource_Handler({0x104f001c0, 0x140002dabe0}, {0x104ffca68, 0x1400014bc50}, 0x14000138380, 0x0)
github.com/hashicorp/[email protected]/tfprotov6/internal/tfplugin6/tfplugin6_grpc.pb.go:651 +0x1c0
google.golang.org/grpc.(*Server).processUnaryRPC(0x1400024c200, {0x104ffca68, 0x1400014bbc0}, 0x14000788a80, 0x140003c49c0, 0x108a9f898, 0x0)
google.golang.org/[email protected]/server.go:1405 +0xca8
google.golang.org/grpc.(*Server).handleStream(0x1400024c200, {0x104ffd3a8, 0x140003ca1a0}, 0x14000788a80)
google.golang.org/[email protected]/server.go:1815 +0x910
google.golang.org/grpc.(*Server).serveStreams.func2.1()
google.golang.org/[email protected]/server.go:1035 +0x84
created by google.golang.org/grpc.(*Server).serveStreams.func2 in goroutine 17
google.golang.org/[email protected]/server.go:1046 +0x13c
Error: The terraform-provider-cloudflare_v5.12.0 plugin crashed!
This is always indicative of a bug within the plugin. It would be immensely
helpful if you could report the crash with the plugin's maintainers so that it
can be fixed. The output above should help diagnose the issue.
Expected output
after an apply, resources should be in alignment, plans showing no drift (and not crash on subsequent read/plan)
Actual output
the output is semi-random. sometimes it crashes, sometimes it shows a delta with null in state. in my example i was lucky enough to get a couple "good" plans that show the delta from state with null and a couple crashes in no discernible order. it is also worth noting the successful apply doesn't change anything on the cloudflare side.
$ tofu init
Initializing the backend...
Initializing provider plugins...
- Finding cloudflare/cloudflare versions matching ">= 5.0.0"...
- Installing cloudflare/cloudflare v5.12.0...
- Installed cloudflare/cloudflare v5.12.0 (signed, key ID C76001609EE3B136)
Providers are signed by their developers.
If you'd like to know more about provider signing, you can read about it here:
https://opentofu.org/docs/cli/plugins/signing/
OpenTofu has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that OpenTofu can guarantee to make the same selections by default when
you run "tofu init" in the future.
OpenTofu has been successfully initialized!
You may now begin working with OpenTofu. Try running "tofu plan" to see
any changes that are required for your infrastructure. All OpenTofu commands
should now work.
If you ever set or change modules or backend configuration for OpenTofu,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
$ tofu apply
cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]
OpenTofu used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
~ update in-place
OpenTofu will perform the following actions:
# cloudflare_zone_setting.security_header will be updated in-place
~ resource "cloudflare_zone_setting" "security_header" {
~ editable = true -> (known after apply)
+ enabled = (known after apply)
id = "security_header"
~ modified_on = "2021-08-13T15:29:30Z" -> (known after apply)
+ time_remaining = (known after apply)
~ value = {
+ enabled = true
+ include_subdomains = true
+ max_age = 31536000
+ nosniff = false
- strict_transport_security = {
- enabled = true
- include_subdomains = true
- max_age = 15552000
- nosniff = false
- preload = false
}
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Do you want to perform these actions?
OpenTofu will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
cloudflare_zone_setting.security_header: Modifying... [id=security_header]
cloudflare_zone_setting.security_header: Modifications complete after 2s [id=security_header]
Apply complete! Resources: 0 added, 1 changed, 0 destroyed.
$ tofu apply
cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]
╷
│ Error: Request cancelled
│
│ The plugin6.(*GRPCProvider).ReadResource request was cancelled.
╵
Stack trace from the terraform-provider-cloudflare_v5.12.0 plugin:
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x2 addr=0x6 pc=0x100700a04]
goroutine 22 [running]:
math/big.(*Float).Int(0x0, 0x101?)
math/big/float.go:1085 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/types.intValue({0x105042188?, 0x140008811a0?})
github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:38 +0x1e8
github.com/cloudflare/terraform-provider-cloudflare/internal/types.IntValue({0x105042188, 0x140008811a0})
github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:48 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x105042188, 0x140008811a0}, {0x105042188, 0x14000881160})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:111 +0x1a8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals.func2({0x105042188?, 0x140008811a0?}, {0x105042188?, 0x14000881160?})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:149 +0x54
maps.EqualFunc[...](0x1400031ee70, 0x1400078be60?, 0x1400009e998)
maps/maps.go:36 +0xe8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x105003908, 0x1400031ef00}, {0x105003908, 0x1400031ee70})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:147 +0x2e0
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x104ffca68, 0x1400078bdd0}, {0x1050422a8, 0x1400031ef48}, {0x1050422a8, 0x1400031eea0})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:107 +0x3f8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.NormalizedDynamicValue.DynamicSemanticEquals(...)
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:164
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEqualityDynamic({0x104ffca68, 0x1400078bdd0}, {{{0x14000881110, 0x1, 0x1}}, {0x1050422a8, 0x1400031eea0}, {0x1050422a8, 0x1400031ef30}}, 0x1400009efa0)
github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality_dynamic.go:61 +0x3c8
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEquality({0x104ffca68, 0x140001507e0}, {{{0x14000881110, 0x1, 0x1}}, {0x1050422a8, 0x1400031eea0}, {0x1050422a8, 0x1400031ef30}}, 0x1400009efa0)
github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:87 +0x434
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.SchemaSemanticEquality({0x104ffca68, 0x140001507e0}, {{{0x1034f2c89, 0x5}, {0x1050c4df0, 0x140003f2d20}, {{0x1050868b0, 0x1400078a810}, {0x104270040, 0x1400078a5a0}}}, ...}, ...)
github.com/hashicorp/[email protected]/internal/fwserver/schema_semantic_equality.go:80 +0x214
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.(*Server).ReadResource(0x140001ad688, {0x104ffca68, 0x140001507e0}, 0x140003f3810, 0x1400009f5d0)
github.com/hashicorp/[email protected]/internal/fwserver/server_readresource.go:217 +0xe50
github.com/hashicorp/terraform-plugin-framework/internal/proto6server.(*Server).ReadResource(0x140001ad688, {0x104ffca68?, 0x140001506f0?}, 0x140003f3770)
github.com/hashicorp/[email protected]/internal/proto6server/server_readresource.go:71 +0x438
github.com/hashicorp/terraform-plugin-go/tfprotov6/tf6server.(*server).ReadResource(0x140002dabe0, {0x104ffca68?, 0x1400014bc50?}, 0x140002e2a80)
github.com/hashicorp/[email protected]/tfprotov6/tf6server/server.go:860 +0x21c
github.com/hashicorp/terraform-plugin-go/tfprotov6/internal/tfplugin6._Provider_ReadResource_Handler({0x104f001c0, 0x140002dabe0}, {0x104ffca68, 0x1400014bc50}, 0x14000138380, 0x0)
github.com/hashicorp/[email protected]/tfprotov6/internal/tfplugin6/tfplugin6_grpc.pb.go:651 +0x1c0
google.golang.org/grpc.(*Server).processUnaryRPC(0x1400024c200, {0x104ffca68, 0x1400014bbc0}, 0x14000788a80, 0x140003c49c0, 0x108a9f898, 0x0)
google.golang.org/[email protected]/server.go:1405 +0xca8
google.golang.org/grpc.(*Server).handleStream(0x1400024c200, {0x104ffd3a8, 0x140003ca1a0}, 0x14000788a80)
google.golang.org/[email protected]/server.go:1815 +0x910
google.golang.org/grpc.(*Server).serveStreams.func2.1()
google.golang.org/[email protected]/server.go:1035 +0x84
created by google.golang.org/grpc.(*Server).serveStreams.func2 in goroutine 17
google.golang.org/[email protected]/server.go:1046 +0x13c
Error: The terraform-provider-cloudflare_v5.12.0 plugin crashed!
This is always indicative of a bug within the plugin. It would be immensely
helpful if you could report the crash with the plugin's maintainers so that it
can be fixed. The output above should help diagnose the issue.
$ tofu apply
cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]
OpenTofu used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
~ update in-place
OpenTofu will perform the following actions:
# cloudflare_zone_setting.security_header will be updated in-place
~ resource "cloudflare_zone_setting" "security_header" {
~ editable = true -> (known after apply)
+ enabled = (known after apply)
id = "security_header"
~ modified_on = "2025-11-07T15:06:36Z" -> (known after apply)
+ time_remaining = (known after apply)
~ value = {
~ enabled = null -> true
~ include_subdomains = null -> true
~ max_age = null -> 31536000
~ nosniff = null -> false
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Do you want to perform these actions?
OpenTofu will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
cloudflare_zone_setting.security_header: Modifying... [id=security_header]
cloudflare_zone_setting.security_header: Modifications complete after 1s [id=security_header]
Apply complete! Resources: 0 added, 1 changed, 0 destroyed.
$ tofu apply
cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]
OpenTofu used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
~ update in-place
OpenTofu will perform the following actions:
# cloudflare_zone_setting.security_header will be updated in-place
~ resource "cloudflare_zone_setting" "security_header" {
~ editable = true -> (known after apply)
+ enabled = (known after apply)
id = "security_header"
~ modified_on = "2025-11-07T15:08:23Z" -> (known after apply)
+ time_remaining = (known after apply)
~ value = {
~ enabled = null -> true
~ include_subdomains = null -> true
~ max_age = null -> 31536000
~ nosniff = null -> false
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
Do you want to perform these actions?
OpenTofu will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
cloudflare_zone_setting.security_header: Modifying... [id=security_header]
cloudflare_zone_setting.security_header: Modifications complete after 1s [id=security_header]
Apply complete! Resources: 0 added, 1 changed, 0 destroyed.
$ tofu apply
cloudflare_zone_setting.security_header: Refreshing state... [id=security_header]
╷
│ Error: Plugin did not respond
│
│ The plugin encountered an error, and failed to respond to the plugin6.(*GRPCProvider).ReadResource call. The plugin logs may contain more details.
╵
Stack trace from the terraform-provider-cloudflare_v5.12.0 plugin:
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x2 addr=0x6 pc=0x104464a04]
goroutine 52 [running]:
math/big.(*Float).Int(0x0, 0x101?)
math/big/float.go:1085 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/types.intValue({0x108da6188?, 0x1400003f910?})
github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:38 +0x1e8
github.com/cloudflare/terraform-provider-cloudflare/internal/types.IntValue({0x108da6188, 0x1400003f910})
github.com/cloudflare/terraform-provider-cloudflare/internal/types/accessors.go:48 +0x24
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x108d60a68, 0x140004998f0}, {0x108da6188, 0x1400003f910}, {0x108da6188, 0x1400003f8d0})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:111 +0x1a8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals.func2({0x108da6188?, 0x1400003f910?}, {0x108da6188?, 0x1400003f8d0?})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:149 +0x54
maps.EqualFunc[...](0x140003c8978, 0x14000499980?, 0x14000452998)
maps/maps.go:36 +0xe8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x108d60a68, 0x140004998f0}, {0x108d67908, 0x140003c8a08}, {0x108d67908, 0x140003c8978})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:147 +0x2e0
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.semanticEquals({0x108d60a68, 0x140004998f0}, {0x108da62a8, 0x140003c8a50}, {0x108da62a8, 0x140003c89a8})
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:107 +0x3f8
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield.NormalizedDynamicValue.DynamicSemanticEquals(...)
github.com/cloudflare/terraform-provider-cloudflare/internal/customfield/dynamic.go:164
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEqualityDynamic({0x108d60a68, 0x140004998f0}, {{{0x1400003f880, 0x1, 0x1}}, {0x108da62a8, 0x140003c89a8}, {0x108da62a8, 0x140003c8a38}}, 0x14000452fa0)
github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality_dynamic.go:61 +0x3c8
github.com/hashicorp/terraform-plugin-framework/internal/fwschemadata.ValueSemanticEquality({0x108d60a68, 0x140002793b0}, {{{0x1400003f880, 0x1, 0x1}}, {0x108da62a8, 0x140003c89a8}, {0x108da62a8, 0x140003c8a38}}, 0x14000452fa0)
github.com/hashicorp/[email protected]/internal/fwschemadata/value_semantic_equality.go:87 +0x434
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.SchemaSemanticEquality({0x108d60a68, 0x140002793b0}, {{{0x107256c89, 0x5}, {0x108e28df0, 0x140004ac550}, {{0x108dea8b0, 0x14000498330}, {0x107fd4040, 0x1400041dec0}}}, ...}, ...)
github.com/hashicorp/[email protected]/internal/fwserver/schema_semantic_equality.go:80 +0x214
github.com/hashicorp/terraform-plugin-framework/internal/fwserver.(*Server).ReadResource(0x140001ad688, {0x108d60a68, 0x140002793b0}, 0x140004ac140, 0x140004535d0)
github.com/hashicorp/[email protected]/internal/fwserver/server_readresource.go:217 +0xe50
github.com/hashicorp/terraform-plugin-framework/internal/proto6server.(*Server).ReadResource(0x140001ad688, {0x108d60a68?, 0x140002792c0?}, 0x140004acfa0)
github.com/hashicorp/[email protected]/internal/proto6server/server_readresource.go:71 +0x438
github.com/hashicorp/terraform-plugin-go/tfprotov6/tf6server.(*server).ReadResource(0x140002dabe0, {0x108d60a68?, 0x140002788a0?}, 0x140002e2690)
github.com/hashicorp/[email protected]/tfprotov6/tf6server/server.go:860 +0x21c
github.com/hashicorp/terraform-plugin-go/tfprotov6/internal/tfplugin6._Provider_ReadResource_Handler({0x108c641c0, 0x140002dabe0}, {0x108d60a68, 0x140002788a0}, 0x14000035d80, 0x0)
github.com/hashicorp/[email protected]/tfprotov6/internal/tfplugin6/tfplugin6_grpc.pb.go:651 +0x1c0
google.golang.org/grpc.(*Server).processUnaryRPC(0x1400024c200, {0x108d60a68, 0x14000278810}, 0x1400045e720, 0x140003c49c0, 0x10c803898, 0x0)
google.golang.org/[email protected]/server.go:1405 +0xca8
google.golang.org/grpc.(*Server).handleStream(0x1400024c200, {0x108d613a8, 0x14000472000}, 0x1400045e720)
google.golang.org/[email protected]/server.go:1815 +0x910
google.golang.org/grpc.(*Server).serveStreams.func2.1()
google.golang.org/[email protected]/server.go:1035 +0x84
created by google.golang.org/grpc.(*Server).serveStreams.func2 in goroutine 20
google.golang.org/[email protected]/server.go:1046 +0x13c
Error: The terraform-provider-cloudflare_v5.12.0 plugin crashed!
This is always indicative of a bug within the plugin. It would be immensely
helpful if you could report the crash with the plugin's maintainers so that it
can be fixed. The output above should help diagnose the issue.
Steps to reproduce
with the example code above:
init
plan
apply
plan or apply again
Additional factoids
likely related to #6315 but with my testing pre-5.9 is also affected.
References
No response
Metadata
Metadata
Assignees
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.version/5Categorizes issue or PR as related to version 5 of the provider.Categorizes issue or PR as related to version 5 of the provider.