133 lines
6.3 KiB
Markdown
133 lines
6.3 KiB
Markdown
---
|
|
stage: Configure
|
|
group: Configure
|
|
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
|
|
---
|
|
|
|
# Troubleshooting the Terraform integration with GitLab
|
|
|
|
When you are using the integration with Terraform and GitLab, you might experience issues you need to troubleshoot.
|
|
|
|
## `gitlab_group_share_group` resources not detected when subgroup state is refreshed
|
|
|
|
The GitLab Terraform provider can fail to detect existing `gitlab_group_share_group` resources
|
|
due to the issue ["User with permissions cannot retrieve `share_with_groups` from the API"](https://gitlab.com/gitlab-org/gitlab/-/issues/328428).
|
|
This results in an error when running `terraform apply` because Terraform attempts to recreate an
|
|
existing resource.
|
|
|
|
For example, consider the following group/subgroup configuration:
|
|
|
|
```plaintext
|
|
parent-group
|
|
├── subgroup-A
|
|
└── subgroup-B
|
|
```
|
|
|
|
Where:
|
|
|
|
- User `user-1` creates `parent-group`, `subgroup-A`, and `subgroup-B`.
|
|
- `subgroup-A` is shared with `subgroup-B`.
|
|
- User `terraform-user` is member of `parent-group` with inherited `owner` access to both subgroups.
|
|
|
|
When the Terraform state is refreshed, the API query `GET /groups/:subgroup-A_id` issued by the provider does not return the
|
|
details of `subgroup-B` in the `shared_with_groups` array. This leads to the error.
|
|
|
|
To workaround this issue, make sure to apply one of the following conditions:
|
|
|
|
1. The `terraform-user` creates all subgroup resources.
|
|
1. Grant Maintainer or Owner role to the `terraform-user` user on `subgroup-B`.
|
|
1. The `terraform-user` inherited access to `subgroup-B` and `subgroup-B` contains at least one project.
|
|
|
|
### Invalid CI/CD syntax error when using the base template
|
|
|
|
You might encounter a CI/CD syntax error when using the Terraform templates:
|
|
|
|
- On GitLab 14.2 and later, using the `latest` template.
|
|
- On GitLab 15.0 and later, using any version of the template.
|
|
|
|
For example:
|
|
|
|
```yaml
|
|
include:
|
|
# On 14.2 and later, when using either of the following:
|
|
- template: Terraform/Base.latest.gitlab-ci.yml
|
|
- template: Terraform.latest.gitlab-ci.yml
|
|
# On 15.0 and later, the following templates have also been updated:
|
|
- template: Terraform/Base.gitlab-ci.yml
|
|
- template: Terraform.gitlab-ci.yml
|
|
|
|
my-terraform-job:
|
|
extends: .apply
|
|
```
|
|
|
|
There are three different causes for the error:
|
|
|
|
- In the case of `.init`, the error occurs because the init stage and jobs [were removed](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/71188) from the templates, since they are no longer required. To resolve the syntax error, you can safely remove any jobs extending `.init`.
|
|
- For all other jobs, the reason for the failure is that the base jobs have been [renamed](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/67719): A `.terraform:` prefix has been added to every job name. For example, `.apply` became `.terraform:apply`. To fix this error, you can update the base job names. For example:
|
|
|
|
```diff
|
|
my-terraform-job:
|
|
- extends: .apply
|
|
+ extends: .terraform:apply
|
|
```
|
|
|
|
- In GitLab 15.0, templates use [`rules`](../../../ci/yaml/index.md#rules) syntax
|
|
instead of [`only/except`](../../../ci/yaml/index.md#only--except).
|
|
Ensure the syntax in your `.gitlab-ci.yml` file does not include both.
|
|
|
|
#### Use an older version of the template
|
|
|
|
Breaking changes can occur during major releases. If you encounter a breaking change or want to use an older version of a template, you can update your `.gitlab-ci.yml` to refer to an older one. For example:
|
|
|
|
```yaml
|
|
include:
|
|
remote: https://gitlab.com/gitlab-org/configure/template-archive/-/raw/main/14-10/Terraform.gitlab-ci.yml
|
|
```
|
|
|
|
View the [template-archive](https://gitlab.com/gitlab-org/configure/template-archive) to see which templates are available.
|
|
|
|
## Troubleshooting Terraform state
|
|
|
|
### Unable to lock Terraform state files in CI jobs for `terraform apply` using a plan created in a previous job
|
|
|
|
When passing `-backend-config=` to `terraform init`, Terraform persists these values inside the plan
|
|
cache file. This includes the `password` value.
|
|
|
|
As a result, to create a plan and later use the same plan in another CI job, you might get the error
|
|
`Error: Error acquiring the state lock` errors when using `-backend-config=password=$CI_JOB_TOKEN`.
|
|
This happens because the value of `$CI_JOB_TOKEN` is only valid for the duration of the current job.
|
|
|
|
As a workaround, use [http backend configuration variables](https://www.terraform.io/language/settings/backends/http#configuration-variables) in your CI job,
|
|
which is what happens behind the scenes when following the
|
|
[Get started using GitLab CI](terraform_state.md#initialize-a-terraform-state-as-a-backend-by-using-gitlab-cicd) instructions.
|
|
|
|
### Error: "address": required field is not set
|
|
|
|
By default, we set `TF_ADDRESS` to `${CI_API_V4_URL}/projects/${CI_PROJECT_ID}/terraform/state/${TF_STATE_NAME}`.
|
|
If you don't set `TF_STATE_NAME` or `TF_ADDRESS` in your job, the job fails with the error message
|
|
`Error: "address": required field is not set`.
|
|
|
|
To resolve this, ensure that either `TF_ADDRESS` or `TF_STATE_NAME` is accessible in the
|
|
job that returned the error:
|
|
|
|
1. Configure the [CI/CD environment scope](../../../ci/variables/index.md#add-a-cicd-variable-to-a-project) for the job.
|
|
1. Set the job's [environment](../../../ci/yaml/index.md#environment), matching the environment scope from the previous step.
|
|
|
|
### Error refreshing state: HTTP remote state endpoint requires auth
|
|
|
|
To resolve this, ensure that:
|
|
|
|
- The access token you use has `api` scope.
|
|
- If you have set the `TF_HTTP_PASSWORD` CI/CD variable, make sure that you either:
|
|
- Set the same value as `TF_PASSWORD`
|
|
- Remove `TF_HTTP_PASSWORD` variable if your CI/CD job does not explicitly use it.
|
|
|
|
### Enable Developer role access to destructive commands
|
|
|
|
To permit a user with the Developer role to run destructive commands, you need a workaround:
|
|
|
|
1. [Create a project access token](../../project/settings/project_access_tokens.md#create-a-project-access-token) with `api` scope.
|
|
1. Add `TF_USERNAME` and `TF_PASSWORD` to your CI/CD variables:
|
|
1. Set the value of `TF_USERNAME` to the username of your project access token.
|
|
1. Set the value of `TF_PASSWORD` to the password of your project access token.
|
|
1. Optional. Protect the variables to make them only available in pipelines that run on protected branches or protected tags.
|