home..

Pulumi Bug Report

pulumi up을 실행하는데 protobuf 관련 오류

    Traceback (most recent call last):
      File "/home/leeyujin/.pulumi/bin/pulumi-language-python-exec", line 14, in <module>
        import pulumi
      ...  
	  _message.Message._CheckCalledFromGeneratedFile()
    TypeError: Descriptors cannot not be created directly.
    If this call came from a _pb2.py file, your generated code is out of date and must be regenerated with protoc >= 3.19.0.

이전에 업데이트하던 작업이 pending되어 이후 업데이트와 충돌

error: the current deployment has 1 resource(s) with pending operations:
  * urn:pulumi:dev::kubernetes:core/v1:Service:, interrupted while updating

These resources are in an unknown state because the Pulumi CLI was interrupted while
waiting for changes to these resources to complete. You should confirm whether or not the
operations listed completed successfully by checking the state of the appropriate provider.
For example, if you are using AWS, you can confirm using the AWS Console.

Once you have confirmed the status of the interrupted operations, you can repair your stack
using 'pulumi stack export' to export your stack to a file. For each operation that succeeded,
remove that operation from the "pending_operations" section of the file. Once this is complete,
use 'pulumi stack import' to import the repaired stack.

refusing to proceed

image_pull_secret 관련 오류

error: resource ..deployment was not successfully created by the Kubernetes API server : Deployment in version "v1" cannot be handled as a Deployment: v1.Deployment.Spec: v1.DeploymentSpec.Template: v1.PodTemplateSpec.Spec: v1.PodSpec.ImagePullSecrets: []v1.LocalObjectReference: decode slice: expect [ or n, but found ", error found in #10 byte of ...|Secrets":"|..., bigger context ...|"server","protocol":"TCP"}]}],"imagePullSecrets":"","serviceAccountName":"|...

stderr: error: failed to decrypt encrypted configuration value 'snowflake:password': bad value

This can occur when a secret is copied from one stack to another. Encryption of secrets is done per-stack and
it is not possible to share an encrypted configuration value across stacks.
© 2024 Yujin Lee   •  Powered by Soopr   •  Theme  Moonwalk