sparse-intern-71089
02/26/2019, 2:14 PMfaint-vegetable-61837
02/26/2019, 2:22 PMstocky-spoon-28903
02/26/2019, 2:28 PMfaint-vegetable-61837
02/26/2019, 2:28 PMfaint-vegetable-61837
02/26/2019, 2:31 PMI0226 09:29:22.671328 19436 log.go:56] Error closing 'nodejs' language plugin during shutdown; ignoring: 1 error occurred:
* operation not permitted
Diagnostics:
pulumi:pulumi:Stack (devops-eks-identity-test1):
The Pulumi runtime detected that 16 promises were still active
at the time that the process exited. There are a few ways that this can occur:
* Not using `await` or `.then` on a Promise returned from a Pulumi API
* Introducing a cyclic dependency between two Pulumi Resources
* A bug in the Pulumi Runtime
Leaving promises active is probably not what you want. If you are unsure about
why you are seeing this message, re-run your program with the `PULUMI_DEBUG_PROMISE_LEAKS`
environment variable. The Pulumi runtime will then print out additional
debug information about the leaked promises.
error: an unhandled error occurred: Program exited with non-zero exit code: 1
error: an error occurred while advancing the preview
<http://github.com/pulumi/pulumi/pkg/engine.printPlan|github.com/pulumi/pulumi/pkg/engine.printPlan>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/engine/plan.go:251
<http://github.com/pulumi/pulumi/pkg/engine.update|github.com/pulumi/pulumi/pkg/engine.update>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/engine/update.go:155
<http://github.com/pulumi/pulumi/pkg/engine.Update|github.com/pulumi/pulumi/pkg/engine.Update>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/engine/update.go:88
<http://github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudBackend).runEngineAction|github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudBackend).runEngineAction>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/backend/httpstate/backend.go:826
<http://github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudBackend).apply|github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudBackend).apply>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/backend/httpstate/backend.go:766
<http://github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudBackend).apply-fm|github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudBackend).apply-fm>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/backend/httpstate/backend.go:662
<http://github.com/pulumi/pulumi/pkg/backend.PreviewThenPrompt|github.com/pulumi/pulumi/pkg/backend.PreviewThenPrompt>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/backend/apply.go:112
<http://github.com/pulumi/pulumi/pkg/backend.PreviewThenPromptThenExecute|github.com/pulumi/pulumi/pkg/backend.PreviewThenPromptThenExecute>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/backend/apply.go:194
<http://github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudBackend).Update|github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudBackend).Update>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/backend/httpstate/backend.go:662
<http://github.com/pulumi/pulumi/pkg/backend.UpdateStack|github.com/pulumi/pulumi/pkg/backend.UpdateStack>
/Users/travis/gopath/src/github.com/pulumi/pulumi/pkg/backend/stack.go:73
<http://github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudStack).Update|github.com/pulumi/pulumi/pkg/backend/httpstate.(*cloudStack).Update>
faint-vegetable-61837
02/26/2019, 2:32 PMimport * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
import * as util from "./util";
import * as iam from "./lib";
const baseline = new iam.BaselineIam("baselineIam", {
groups: {
// Create default EKS admins group.
defineEksAdminsGroup: true,
defineRoute53AdminsGroup: true
},
});
//
// EKS management user. Deploys EKS, passes AWS IAM Role ARNs to EKS, so that workloads can be
// correlated to AWS IAM.
//
const eksAdminCiUser = new util.BotUser("eksAdminCiUser", {
groupMembership: {
groups: [
baseline.groups.eksAdmins!.name,
baseline.groups.useExistingIamRoles!.name, // To use pass role ARNs to k8s RoleBindings.
],
},
});
const eksAdminCiUserKey = eksAdminCiUser.createAccessKey("eksAdminCiUser");
export const eksUserCiUserAccessKey = {
id: eksAdminCiUserKey.id,
secret: eksAdminCiUserKey.secret,
};
const route53User = new util.BotUser("router53User", {
groupMembership: {
groups: [
baseline.groups.route53Admins!.name
]
},
});
const route53UserKey = route53User.createAccessKey("route53User");
export const route53UserAccessKey = {
id: route53UserKey.id,
secret: route53UserKey.secret,
};
const kubeAppRole = util.newRoleWithPolicies(
"kubeAppRole",
{
description: "Infrastructure management role for CI users",
assumeRolePolicy: eksAdminCiUser.user.arn.apply(util.assumeRolePolicy),
},
{
ecrPowerUser: aws.iam.AmazonEC2ContainerRegistryPowerUser,
passRole: baseline.policies.useExistingIamRoles!.arn,
},
);
export const kubeAppRoleArn = kubeAppRole.arn;
faint-vegetable-61837
02/26/2019, 2:45 PMfaint-vegetable-61837
02/26/2019, 3:10 PMfaint-vegetable-61837
02/26/2019, 3:10 PMgentle-diamond-70147
02/26/2019, 3:18 PMfaint-vegetable-61837
02/26/2019, 3:32 PMfaint-vegetable-61837
02/26/2019, 3:34 PMcurl -fsSL <https://get.pulumi.com/> | sh
, but still have 0.16.14faint-vegetable-61837
02/26/2019, 3:39 PMcurl --fail --silent -L "<https://pulumi.io/latest-version>
gives 0.16.14faint-vegetable-61837
02/26/2019, 3:47 PMfaint-vegetable-61837
02/26/2019, 4:35 PMaws.iam.RolePolicyAttachment
resources. Not sure why one is created, and the other one gives an error - does not look like this is an IAM permissionfaint-vegetable-61837
02/26/2019, 4:36 PMstocky-spoon-28903
02/26/2019, 4:40 PMstocky-spoon-28903
02/26/2019, 4:40 PMstocky-spoon-28903
02/26/2019, 4:40 PMfaint-vegetable-61837
02/26/2019, 5:20 PMPulumi version: v0.16.16
Plugin nodejs [language] version: 0.16.16
Plugin aws [resource] version: 0.16.10
stocky-spoon-28903
02/26/2019, 5:28 PM