Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package digger-cli for openSUSE:Factory 
checked in at 2025-05-30 14:36:24
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/digger-cli (Old)
 and      /work/SRC/openSUSE:Factory/.digger-cli.new.25440 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "digger-cli"

Fri May 30 14:36:24 2025 rev:19 rq:1281042 version:0.6.102

Changes:
--------
--- /work/SRC/openSUSE:Factory/digger-cli/digger-cli.changes    2025-05-22 
16:56:10.620155130 +0200
+++ /work/SRC/openSUSE:Factory/.digger-cli.new.25440/digger-cli.changes 
2025-05-30 17:20:28.919158518 +0200
@@ -1,0 +2,10 @@
+Thu May 29 05:35:34 UTC 2025 - Johannes Kastl 
<opensuse_buildserv...@ojkastl.de>
+
+- Update to version 0.6.102:
+  - add self hosting docs for azure by @mintlify in #1954
+  - update mint.json by @mintlify in #1955
+  - fix mint.json by @mintlify in #1956
+  - support setting log level for backend by @motatoes in #1958
+  - add more debug logs in deletes by @motatoes in #1960
+
+-------------------------------------------------------------------

Old:
----
  digger-cli-0.6.101.obscpio

New:
----
  digger-cli-0.6.102.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ digger-cli.spec ++++++
--- /var/tmp/diff_new_pack.IRGPD8/_old  2025-05-30 17:20:29.843197560 +0200
+++ /var/tmp/diff_new_pack.IRGPD8/_new  2025-05-30 17:20:29.847197729 +0200
@@ -19,7 +19,7 @@
 %define executable_name digger
 
 Name:           digger-cli
-Version:        0.6.101
+Version:        0.6.102
 Release:        0
 Summary:        CLI for the digger open source IaC orchestration tool
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.IRGPD8/_old  2025-05-30 17:20:29.879199081 +0200
+++ /var/tmp/diff_new_pack.IRGPD8/_new  2025-05-30 17:20:29.883199250 +0200
@@ -6,7 +6,7 @@
     <param name="exclude">go.mod</param>
     <param name="exclude">go.work</param>
     <param name="exclude">go.work.sum</param>
-    <param name="revision">v0.6.101</param>
+    <param name="revision">v0.6.102</param>
     <param name="match-tag">v*</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="versionrewrite-pattern">v(.*)</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.IRGPD8/_old  2025-05-30 17:20:29.907200264 +0200
+++ /var/tmp/diff_new_pack.IRGPD8/_new  2025-05-30 17:20:29.911200433 +0200
@@ -1,7 +1,7 @@
 <servicedata>
 <service name="tar_scm">
                 <param name="url">https://github.com/diggerhq/digger</param>
-              <param 
name="changesrevision">53d535e855158827dc559e5189803e47a0fada54</param></service><service
 name="tar_scm">
+              <param 
name="changesrevision">54bb405153b3ca6edfafb4c6f903bc748cc1e93d</param></service><service
 name="tar_scm">
                 <param 
name="url">https://github.com/johanneskastl/digger</param>
               <param 
name="changesrevision">8fe377068e53e2050ff4c745388d8428d2b13bb0</param></service></servicedata>
 (No newline at EOF)

++++++ digger-cli-0.6.101.obscpio -> digger-cli-0.6.102.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/digger-cli-0.6.101/backend/bootstrap/main.go 
new/digger-cli-0.6.102/backend/bootstrap/main.go
--- old/digger-cli-0.6.101/backend/bootstrap/main.go    2025-05-20 
21:19:45.000000000 +0200
+++ new/digger-cli-0.6.102/backend/bootstrap/main.go    2025-05-28 
01:50:32.000000000 +0200
@@ -247,8 +247,21 @@
 }
 
 func initLogging() {
+       logLevel := os.Getenv("DIGGER_LOG_LEVEL")
+       var level slog.Leveler
+
+       if logLevel == "DEBUG" {
+               level = slog.LevelDebug
+       } else if logLevel == "WARN" {
+               level = slog.LevelWarn
+       } else if logLevel == "ERROR" {
+               level = slog.LevelError
+       } else {
+               level = slog.LevelInfo
+       }
+
        handler := slog.NewTextHandler(os.Stdout, &slog.HandlerOptions{
-               Level: slog.LevelInfo,
+               Level: level,
        })
        logger := slog.New(handler)
        slog.SetDefault(logger)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/digger-cli-0.6.101/backend/controllers/projects.go 
new/digger-cli-0.6.102/backend/controllers/projects.go
--- old/digger-cli-0.6.101/backend/controllers/projects.go      2025-05-20 
21:19:45.000000000 +0200
+++ new/digger-cli-0.6.102/backend/controllers/projects.go      2025-05-28 
01:50:32.000000000 +0200
@@ -1522,6 +1522,10 @@
                        return fmt.Errorf("error getting github service: %v", 
err)
                }
 
+               slog.Debug("Found previous PR batches",
+                       "len(prBatches)", len(prBatches),
+               )
+
                for _, prBatch := range prBatches {
                        if prBatch.BatchType == 
orchestrator_scheduler.DiggerCommandApply {
                                slog.Info("found previous apply job for PR 
therefore not deleting earlier comments")
@@ -1529,6 +1533,8 @@
                        }
                }
 
+               slog.Debug("Deleting prior comments for batch", "batchId", 
batch.ID)
+
                allDeletesSuccessful := true
                for _, prBatch := range prBatches {
                        if prBatch.ID == batch.ID {
@@ -1557,6 +1563,7 @@
                        }
                }
 
+               slog.Debug("Deletion of prior comments complete", 
"allDeletesSuccessful", allDeletesSuccessful)
                if !allDeletesSuccessful {
                        slog.Warn("some of the previous comments failed to 
delete")
                }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/digger-cli-0.6.101/cli/cmd/digger/default.go 
new/digger-cli-0.6.102/cli/cmd/digger/default.go
--- old/digger-cli-0.6.101/cli/cmd/digger/default.go    2025-05-20 
21:19:45.000000000 +0200
+++ new/digger-cli-0.6.102/cli/cmd/digger/default.go    2025-05-28 
01:50:32.000000000 +0200
@@ -24,6 +24,8 @@
        var level slog.Leveler
        if logLevel == "DEBUG" {
                level = slog.LevelDebug
+       } else if logLevel == "WARN" {
+               level = slog.LevelWarn
        } else {
                level = slog.LevelInfo
        }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/digger-cli-0.6.101/docs/ce/self-host/self-host-on-azure.mdx 
new/digger-cli-0.6.102/docs/ce/self-host/self-host-on-azure.mdx
--- old/digger-cli-0.6.101/docs/ce/self-host/self-host-on-azure.mdx     
1970-01-01 01:00:00.000000000 +0100
+++ new/digger-cli-0.6.102/docs/ce/self-host/self-host-on-azure.mdx     
2025-05-28 01:50:32.000000000 +0200
@@ -0,0 +1,224 @@
+---
+title: "Self Host on Azure"
+---
+
+This guide will show you how to set up digger orchestrator on azure and setup 
your github workflow to trigger workflow on azure\! This guide assumes that you 
are using github actions for CI. Lets get started
+
+# Installing the orchestrator
+
+The easiest way to install the orchestrator is via helmchart in kubernetes. 
The deployed service needs to be able to listen to webhooks from github for 
using github actions
+
+## Install the helm chart
+
+Install the `digger-backend` helm chart from 
[**https://diggerhq.github.io/helm-charts/**](https://diggerhq.github.io/helm-charts/**),
 leaving empty all the data related to the GitHub App. You can also use the 
postgres database defined within the helmchart or define your own. Here’s a 
good starter set for my-values.yml:
+
+```
+digger:
+  image:
+    repository: registry.digger.dev/diggerhq/digger_backend
+    tag: v0.6.101
+  service:
+    type: NodePort
+    port: 3000
+  ingress:
+    enabled: true
+    host: mo-digger-test.ngrok.app
+
+  secret:
+    useExistingSecret: false
+    existingSecretName: ""
+
+    httpBasicAuthUsername: "admin"
+    httpBasicAuthPassword: "abc123"
+    bearerAuthToken: "salkfjadslkfj" # You should generate
+    hostname: "<https://mo-digger-test.ngrok.app>"
+    githubOrg: "diggerhq" # replace with org for digger
+    githubAppID: ""
+    githubAppClientID: ""
+    githubAppClientSecret: ""
+    githubAppKeyFile: "" #base64 encoded file
+    githubWebhookSecret: ""
+
+postgres:
+  enabled: true
+  secret:
+    useExistingSecret: false
+```
+
+you can save this file in a file like `mydigger.yml` and run the following 
helm commands to install it in your k8s cluster:
+
+```
+$ helm repo add digger <https://diggerhq.github.io/helm-charts/>
+$ helm repo update
+$ helm install mydigger digger/digger-backend -f mydigger.yml
+```
+
+This will be: using the latest tag as of this guide v0.6.101. It will also use 
a NodePort, you can use Loadbalancer or ClusterIP instead if relevant. It will 
enable http basic auth for the service, make sure to change the password\! It 
will also launch a postgres instance as a continaer for your quick test. In 
prod we advice launching a managed postgres instance for persistence.
+
+If all goes well you will see this fancy welcome screen when you visit the 
endpoint
+
+![Screenshot2025 05 26at19 00 55 
Pn](/docs/images/Screenshot2025-05-26at19.00.55.png)
+
+Now you can visit /github/setup endpoint and you will be greeted with this 
setup wizard for creation of a digger github app with the right settings
+
+![Screenshot2025 05 26at19 00 33 
Pn](/docs/images/Screenshot2025-05-26at19.00.33.png)
+
+![Screenshot2025 05 26at19 00 38 
Pn](/docs/images/Screenshot2025-05-26at19.00.38.png)
+
+After successful installation you will see all the github credentials in the 
redirect including ID, webhook secret, private key and so on
+
+![Screenshot2025 05 26at19 14 34 
Pn](/docs/images/Screenshot2025-05-26at19.14.34.png)
+
+Now we need to update the values from mydigger.yml above for these secrets:
+
+```
+    githubAppID: "add"
+    githubAppClientID: "add"
+    githubAppClientSecret: "add"
+    githubAppKeyFile: "add" 
+    githubWebhookSecret: "add"
+```
+
+Next is to update the helmchart:
+
+```
+$ helm upgrade mydigger digger/digger-backend -f digger.yml
+```
+
+Now we can install the newly created github app into the org and if all goes 
well we should see a succesful installation (pick the test repo where you have 
terraform in)\!
+
+![Screenshot2025 05 26at19 58 03 
Pn](/docs/images/Screenshot2025-05-26at19.58.03.png)
+
+Perfect, with all these steps we are finally ready to create the digger 
configuration in the repo and perform our first PR deployment to azure\!
+
+# Configuring Azure terraform repo
+
+## Configure OIDC credentials for actions
+
+We can configure OIDC access using a registration app and subscription ID 
access.
+
+To get these Azure OIDC authentication values, you'll need to set up an Azure 
App Registration and gather the required identifiers. Here's how to obtain each 
value:
+
+## Azure Client ID
+
+1. Go to the Azure Portal ([portal.azure.com](http://portal.azure.com))
+2. Navigate to **Azure Active Directory** \> **App registrations**
+3. Create a new app registration or select an existing one
+4. On the app's **Overview** page, copy the **Application (client) ID**
+
+## Azure Tenant ID
+
+1. In the same app registration's **Overview** page, copy the **Directory 
(tenant) ID**
+2. Alternatively, go to **Azure Active Directory** \> **Overview** and find 
the **Tenant ID**
+
+## Azure Subscription ID
+
+1. Go to **Subscriptions** in the Azure Portal
+2. Select the subscription you want to use
+3. Copy the **Subscription ID** from the overview page
+
+## Setting up for GitHub Actions OIDC
+
+For GitHub Actions with OIDC (which is likely what you're setting up), you'll 
also need to:
+
+1. **Configure the App Registration for OIDC:**
+   - In your app registration, go to **Certificates & secrets**
+   - Under **Federated credentials**, add a new credential
+   - Choose **GitHub Actions deploying Azure resources**
+   - Set the organization, repository, and environment/branch details
+2. **Add secrets to your GitHub repository:**
+   - Go to your GitHub repo \> **Settings** \> **Secrets and variables** \> 
**Actions**
+   - Add these as repository secrets:
+     - `AZURE_CLIENT_ID`
+     - `AZURE_TENANT_ID`
+     - `AZURE_SUBSCRIPTION_ID`
+
+## Configure Github workflow:
+
+create this github workflow in your repository under 
`.github/workflow/digger_workflow.yml`
+
+```
+name: Digger Workflow
+
+on:
+  workflow_dispatch:
+    inputs:
+      spec:
+        required: true
+      run_name:
+        required: false
+
+run-name: '${{inputs.run_name}}'
+
+jobs:
+  digger-job:
+    runs-on: ubuntu-latest
+    permissions:
+      contents: write      # required to merge PRs
+      actions: write       # required for plan persistence
+      id-token: write      # required for workload-identity-federation
+      pull-requests: write # required to post PR comments
+      issues: read         # required to check if PR number is an issue or not
+      statuses: write      # required to validate combined PR status
+
+    steps:
+      - uses: actions/checkout@v4
+      - name: ${{ fromJSON(github.event.inputs.spec).job_id }}
+        run: echo "job id ${{ fromJSON(github.event.inputs.spec).job_id }}"
+      - uses: diggerhq/digger@vLatest
+        with:
+          digger-spec: ${{ inputs.spec }}
+          setup-azure: true
+          azure-client-id: ${{ secrets.AZURE_CLIENT_ID }}
+          azure-tenant-id: ${{ secrets.AZURE_TENANT_ID }}
+          azure-subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
+          setup-terraform: true
+        env:
+          GITHUB_CONTEXT: ${{ toJson(github) }}
+          GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
+          ARM_CLIENT_ID: ${{ secrets.AZURE_CLIENT_ID }}
+          ARM_TENANT_ID: ${{ secrets.AZURE_TENANT_ID }}
+          ARM_SUBSCRIPTION_ID: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
+```
+
+Create a digger.yml in the root of the repository with one project as follows:
+
+```
+projects:
+  - name: myapp-dev-eastus
+    dir: path/to/terraform/dir
+```
+
+Here is some some sample terraform for you to try:
+
+```
+provider "azurerm" {
+  features {}
+}
+
+resource "azurerm_resource_group" "rg" {
+  name     = "rg-myapp-dev-eastus"
+  location = "eastus"
+}
+
+resource "azurerm_storage_account" "storage" {
+  name                     = "mystorageaccount"
+  resource_group_name      = azurerm_resource_group.rg.name
+  location                 = azurerm_resource_group.rg.location
+  account_tier             = "Standard"
+  account_replication_type = "LRS"
+}
+
+resource "azurerm_storage_container" "container" {
+  name                  = "mycontainer"
+  storage_account_name  = azurerm_storage_account.storage.name
+  container_access_type = "private"
+}
+
+```
+
+you can commit that to main, and after that you can create a pull request to 
see digger start planning your changes:
+
+![Screenshot2025 05 26at21 31 18 
Pn](/docs/images/Screenshot2025-05-26at21.31.18.png)
+
+Excellent\! finally you can comment “digger apply” to apply the changes, 
congratulations you have setup digger successfully for azure\! This include PR 
level locks, planning on PR and commenting to apply.
\ No newline at end of file
Binary files 
old/digger-cli-0.6.101/docs/images/Screenshot2025-05-26at19.00.33.png and 
new/digger-cli-0.6.102/docs/images/Screenshot2025-05-26at19.00.33.png differ
Binary files 
old/digger-cli-0.6.101/docs/images/Screenshot2025-05-26at19.00.38.png and 
new/digger-cli-0.6.102/docs/images/Screenshot2025-05-26at19.00.38.png differ
Binary files 
old/digger-cli-0.6.101/docs/images/Screenshot2025-05-26at19.00.55.png and 
new/digger-cli-0.6.102/docs/images/Screenshot2025-05-26at19.00.55.png differ
Binary files 
old/digger-cli-0.6.101/docs/images/Screenshot2025-05-26at19.14.34.png and 
new/digger-cli-0.6.102/docs/images/Screenshot2025-05-26at19.14.34.png differ
Binary files 
old/digger-cli-0.6.101/docs/images/Screenshot2025-05-26at19.58.03.png and 
new/digger-cli-0.6.102/docs/images/Screenshot2025-05-26at19.58.03.png differ
Binary files 
old/digger-cli-0.6.101/docs/images/Screenshot2025-05-26at21.31.18.png and 
new/digger-cli-0.6.102/docs/images/Screenshot2025-05-26at21.31.18.png differ
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/digger-cli-0.6.101/docs/mint.json 
new/digger-cli-0.6.102/docs/mint.json
--- old/digger-cli-0.6.101/docs/mint.json       2025-05-20 21:19:45.000000000 
+0200
+++ new/digger-cli-0.6.102/docs/mint.json       2025-05-28 01:50:32.000000000 
+0200
@@ -110,7 +110,8 @@
         "ce/self-host/deploy-docker",
         "ce/self-host/deploy-docker-compose",
         "ce/self-host/deploy-binary",
-        "ce/self-host/deploy-helm"
+        "ce/self-host/deploy-helm",
+        "ce/self-host/self-host-on-azure"
       ]
     },
     {

++++++ digger-cli.obsinfo ++++++
--- /var/tmp/diff_new_pack.IRGPD8/_old  2025-05-30 17:20:30.751235927 +0200
+++ /var/tmp/diff_new_pack.IRGPD8/_new  2025-05-30 17:20:30.751235927 +0200
@@ -1,5 +1,5 @@
 name: digger-cli
-version: 0.6.101
-mtime: 1747768785
-commit: 53d535e855158827dc559e5189803e47a0fada54
+version: 0.6.102
+mtime: 1748389832
+commit: 54bb405153b3ca6edfafb4c6f903bc748cc1e93d
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/digger-cli/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.digger-cli.new.25440/vendor.tar.gz differ: char 
133, line 2

Reply via email to