Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package terragrunt for openSUSE:Factory checked in at 2023-11-02 20:22:06 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/terragrunt (Old) and /work/SRC/openSUSE:Factory/.terragrunt.new.17445 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "terragrunt" Thu Nov 2 20:22:06 2023 rev:79 rq:1121767 version:0.53.1 Changes: -------- --- /work/SRC/openSUSE:Factory/terragrunt/terragrunt.changes 2023-10-30 22:11:12.585156045 +0100 +++ /work/SRC/openSUSE:Factory/.terragrunt.new.17445/terragrunt.changes 2023-11-02 20:22:20.901775087 +0100 @@ -1,0 +2,8 @@ +Thu Nov 02 05:59:43 UTC 2023 - ka...@b1-systems.de + +- Update to version 0.53.1: + * Update aws-sdk to support SSO (#2774) + * Add Default Retryable Error List to Docs (#2771) + * test: use `T.Setenv` to set env vars in tests (#2205) + +------------------------------------------------------------------- Old: ---- terragrunt-0.53.0.obscpio New: ---- terragrunt-0.53.1.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ terragrunt.spec ++++++ --- /var/tmp/diff_new_pack.tUnvaH/_old 2023-11-02 20:22:22.029816594 +0100 +++ /var/tmp/diff_new_pack.tUnvaH/_new 2023-11-02 20:22:22.029816594 +0100 @@ -19,7 +19,7 @@ %define __arch_install_post export NO_BRP_STRIP_DEBUG=true Name: terragrunt -Version: 0.53.0 +Version: 0.53.1 Release: 0 Summary: Thin wrapper for Terraform for working with multiple Terraform modules License: MIT ++++++ _service ++++++ --- /var/tmp/diff_new_pack.tUnvaH/_old 2023-11-02 20:22:22.057817624 +0100 +++ /var/tmp/diff_new_pack.tUnvaH/_new 2023-11-02 20:22:22.057817624 +0100 @@ -3,7 +3,7 @@ <param name="url">https://github.com/gruntwork-io/terragrunt</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v0.53.0</param> + <param name="revision">v0.53.1</param> <param name="versionformat">@PARENT_TAG@</param> <param name="changesgenerate">enable</param> <param name="versionrewrite-pattern">v(.*)</param> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.tUnvaH/_old 2023-11-02 20:22:22.073818213 +0100 +++ /var/tmp/diff_new_pack.tUnvaH/_new 2023-11-02 20:22:22.077818360 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/gruntwork-io/terragrunt</param> - <param name="changesrevision">dcbec9f11efae59038c4632116a13c89916dc15c</param></service></servicedata> + <param name="changesrevision">5c817c9d0880ce03717303a1ce9e0be59b1f96de</param></service></servicedata> (No newline at EOF) ++++++ terragrunt-0.53.0.obscpio -> terragrunt-0.53.1.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.53.0/docs/_docs/04_reference/config-blocks-and-attributes.md new/terragrunt-0.53.1/docs/_docs/04_reference/config-blocks-and-attributes.md --- old/terragrunt-0.53.0/docs/_docs/04_reference/config-blocks-and-attributes.md 2023-10-27 18:05:16.000000000 +0200 +++ new/terragrunt-0.53.1/docs/_docs/04_reference/config-blocks-and-attributes.md 2023-10-31 16:48:09.000000000 +0100 @@ -1260,6 +1260,26 @@ The terragrunt `retryable_errors` list can be used to override the default list of retryable errors with your own custom list. To learn more about the `retryable_errors` attribute, see the [auto-retry feature overview](/docs/features/auto-retry). +Default List: + +```hcl +retryable_errors = [ + "(?s).*Failed to load state.*tcp.*timeout.*", + "(?s).*Failed to load backend.*TLS handshake timeout.*", + "(?s).*Creating metric alarm failed.*request to update this alarm is in progress.*", + "(?s).*Error installing provider.*TLS handshake timeout.*", + "(?s).*Error configuring the backend.*TLS handshake timeout.*", + "(?s).*Error installing provider.*tcp.*timeout.*", + "(?s).*Error installing provider.*tcp.*connection reset by peer.*", + "NoSuchBucket: The specified bucket does not exist", + "(?s).*Error creating SSM parameter: TooManyUpdates:.*", + "(?s).*app.terraform.io.*: 429 Too Many Requests.*", + "(?s).*ssh_exchange_identification.*Connection closed by remote host.*", + "(?s).*Client\\.Timeout exceeded while awaiting headers.*", + "(?s).*Could not download module.*The requested URL returned error: 429.*", +] +``` + Example: ```hcl diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.53.0/go.mod new/terragrunt-0.53.1/go.mod --- old/terragrunt-0.53.0/go.mod 2023-10-27 18:05:16.000000000 +0200 +++ new/terragrunt-0.53.1/go.mod 2023-10-31 16:48:09.000000000 +0100 @@ -4,7 +4,7 @@ require ( cloud.google.com/go/storage v1.28.1 - github.com/aws/aws-sdk-go v1.44.122 + github.com/aws/aws-sdk-go v1.46.6 github.com/creack/pty v1.1.11 github.com/fatih/structs v1.1.0 github.com/go-errors/errors v1.4.2 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.53.0/go.sum new/terragrunt-0.53.1/go.sum --- old/terragrunt-0.53.0/go.sum 2023-10-27 18:05:16.000000000 +0200 +++ new/terragrunt-0.53.1/go.sum 2023-10-31 16:48:09.000000000 +0100 @@ -296,8 +296,9 @@ github.com/aws/aws-sdk-go v1.15.78/go.mod h1:E3/ieXAlvM0XWO57iftYVDLLvQ824smPP3ATZkfNZeM= github.com/aws/aws-sdk-go v1.31.9/go.mod h1:5zCpMtNQVjRREroY7sYe8lOMRSxkhG6MZveU8YkpAk0= github.com/aws/aws-sdk-go v1.37.0/go.mod h1:hcU610XS61/+aQV88ixoOzUoG7v3b31pl2zKMmprdro= -github.com/aws/aws-sdk-go v1.44.122 h1:p6mw01WBaNpbdP2xrisz5tIkcNwzj/HysobNoaAHjgo= github.com/aws/aws-sdk-go v1.44.122/go.mod h1:y4AeaBuwd2Lk+GepC1E9v0qOiTws0MIWAX4oIKwKHZo= +github.com/aws/aws-sdk-go v1.46.6 h1:6wFnNC9hETIZLMf6SOTN7IcclrOGwp/n9SLp8Pjt6E8= +github.com/aws/aws-sdk-go v1.46.6/go.mod h1:aVsgQcEevwlmQ7qHE9I3h+dtQgpqhFB+i8Phjh7fkwI= github.com/baiyubin/aliyun-sts-go-sdk v0.0.0-20180326062324-cfa1a18b161f/go.mod h1:AuiFmCCPBSrqvVMvuqFuk0qogytodnVFVSN5CeJB8Gc= github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q= github.com/beorn7/perks v1.0.0/go.mod h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8= diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.53.0/test/integration_serial_test.go new/terragrunt-0.53.1/test/integration_serial_test.go --- old/terragrunt-0.53.0/test/integration_serial_test.go 2023-10-27 18:05:16.000000000 +0200 +++ new/terragrunt-0.53.1/test/integration_serial_test.go 2023-10-31 16:48:09.000000000 +0100 @@ -79,11 +79,8 @@ testCase := testCase t.Run(testCase.name, func(t *testing.T) { - // make sure the env var doesn't leak outside of this test case - defer os.Unsetenv("TERRAGRUNT_DOWNLOAD") - if testCase.downloadDirEnv != "" { - require.NoError(t, os.Setenv("TERRAGRUNT_DOWNLOAD", testCase.downloadDirEnv)) + t.Setenv("TERRAGRUNT_DOWNLOAD", testCase.downloadDirEnv) } else { // Clear the variable if it's not set. This is clearing the variable in case the variable is set outside the test process. require.NoError(t, os.Unsetenv("TERRAGRUNT_DOWNLOAD")) @@ -140,8 +137,7 @@ func TestExtraArgumentsWithEnv(t *testing.T) { out := new(bytes.Buffer) - os.Setenv("TF_VAR_env", "prod") - defer os.Unsetenv("TF_VAR_env") + t.Setenv("TF_VAR_env", "prod") runTerragruntRedirectOutput(t, fmt.Sprintf("terragrunt apply -auto-approve --terragrunt-non-interactive --terragrunt-working-dir %s", TEST_FIXTURE_EXTRA_ARGS_PATH), out, os.Stderr) t.Log(out.String()) assert.Contains(t, out.String(), "Hello, World!") @@ -156,16 +152,14 @@ func TestExtraArgumentsWithRegion(t *testing.T) { out := new(bytes.Buffer) - os.Setenv("TF_VAR_region", "us-west-2") - defer os.Unsetenv("TF_VAR_region") + t.Setenv("TF_VAR_region", "us-west-2") runTerragruntRedirectOutput(t, fmt.Sprintf("terragrunt apply -auto-approve --terragrunt-non-interactive --terragrunt-working-dir %s", TEST_FIXTURE_EXTRA_ARGS_PATH), out, os.Stderr) t.Log(out.String()) assert.Contains(t, out.String(), "Hello, World from Oregon!") } func TestPreserveEnvVarApplyAll(t *testing.T) { - os.Setenv("TF_VAR_seed", "from the env") - defer os.Unsetenv("TF_VAR_seed") + t.Setenv("TF_VAR_seed", "from the env") cleanupTerraformFolder(t, TEST_FIXTURE_REGRESSIONS) tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_REGRESSIONS) @@ -197,16 +191,14 @@ } func TestTerragruntValidateInputsWithEnvVar(t *testing.T) { - os.Setenv("TF_VAR_input", "from the env") - defer os.Unsetenv("TF_VAR_input") + t.Setenv("TF_VAR_input", "from the env") moduleDir := filepath.Join("fixture-validate-inputs", "fail-no-inputs") runTerragruntValidateInputs(t, moduleDir, nil, true) } func TestTerragruntValidateInputsWithUnusedEnvVar(t *testing.T) { - os.Setenv("TF_VAR_unused", "from the env") - defer os.Unsetenv("TF_VAR_unused") + t.Setenv("TF_VAR_unused", "from the env") moduleDir := filepath.Join("fixture-validate-inputs", "success-inputs-only") args := []string{"--terragrunt-strict-validate"} @@ -219,7 +211,7 @@ tmpEnvPath := copyEnvironment(t, fixtureSourceMapPath) rootPath := filepath.Join(tmpEnvPath, fixtureSourceMapPath) - os.Setenv( + t.Setenv( "TERRAGRUNT_SOURCE_MAP", strings.Join( []string{ @@ -236,16 +228,7 @@ func TestTerragruntLogLevelEnvVarOverridesDefault(t *testing.T) { // NOTE: this matches logLevelEnvVar const in util/logger.go - envVarName := "TERRAGRUNT_LOG_LEVEL" - oldVal := os.Getenv(envVarName) - defer func() { - if oldVal != "" { - os.Setenv(envVarName, oldVal) - } else { - os.Unsetenv(envVarName) - } - }() - os.Setenv("TERRAGRUNT_LOG_LEVEL", "debug") + t.Setenv("TERRAGRUNT_LOG_LEVEL", "debug") cleanupTerraformFolder(t, TEST_FIXTURE_INPUTS) tmpEnvPath := copyEnvironment(t, ".") @@ -266,16 +249,7 @@ func TestTerragruntLogLevelEnvVarUnparsableLogsErrorButContinues(t *testing.T) { // NOTE: this matches logLevelEnvVar const in util/logger.go - envVarName := "TERRAGRUNT_LOG_LEVEL" - oldVal := os.Getenv(envVarName) - defer func() { - if oldVal != "" { - os.Setenv(envVarName, oldVal) - } else { - os.Unsetenv(envVarName) - } - }() - os.Setenv("TERRAGRUNT_LOG_LEVEL", "unparsable") + t.Setenv("TERRAGRUNT_LOG_LEVEL", "unparsable") cleanupTerraformFolder(t, TEST_FIXTURE_INPUTS) tmpEnvPath := copyEnvironment(t, ".") @@ -354,16 +328,13 @@ } func TestTerragruntWorksWithImpersonateGCSBackend(t *testing.T) { - defaultCreds := os.Getenv("GOOGLE_APPLICATION_CREDENTIALS") - defer os.Setenv("GOOGLE_APPLICATION_CREDENTIALS", defaultCreds) - impersonatorKey := os.Getenv("GCLOUD_SERVICE_KEY_IMPERSONATOR") if impersonatorKey == "" { t.Fatalf("Required environment variable `%s` - not found", "GCLOUD_SERVICE_KEY_IMPERSONATOR") } tmpImpersonatorCreds := createTmpTerragruntConfigContent(t, impersonatorKey, "impersonator-key.json") defer removeFile(t, tmpImpersonatorCreds) - os.Setenv("GOOGLE_APPLICATION_CREDENTIALS", tmpImpersonatorCreds) + t.Setenv("GOOGLE_APPLICATION_CREDENTIALS", tmpImpersonatorCreds) project := os.Getenv("GOOGLE_CLOUD_PROJECT") gcsBucketName := fmt.Sprintf("terragrunt-test-bucket-%s", strings.ToLower(uniqueId())) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.53.0/test/integration_test.go new/terragrunt-0.53.1/test/integration_test.go --- old/terragrunt-0.53.0/test/integration_test.go 2023-10-27 18:05:16.000000000 +0200 +++ new/terragrunt-0.53.1/test/integration_test.go 2023-10-31 16:48:09.000000000 +0100 @@ -1050,13 +1050,16 @@ defer deleteS3Bucket(t, TERRAFORM_REMOTE_STATE_S3_REGION, s3BucketName) defer cleanupTableForTest(t, lockTableName, TERRAFORM_REMOTE_STATE_S3_REGION) + cleanupTerraformFolder(t, TEST_FIXTURE_STACK) + cleanupTerragruntFolder(t, TEST_FIXTURE_STACK) + tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_STACK) - rootTerragruntConfigPath := util.JoinPath(tmpEnvPath, "fixture-stack", config.DefaultTerragruntConfigPath) + rootTerragruntConfigPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_STACK, config.DefaultTerragruntConfigPath) copyTerragruntConfigAndFillPlaceholders(t, rootTerragruntConfigPath, rootTerragruntConfigPath, s3BucketName, lockTableName, "not-used") - mgmtEnvironmentPath := fmt.Sprintf("%s/fixture-stack/mgmt", tmpEnvPath) - stageEnvironmentPath := fmt.Sprintf("%s/fixture-stack/stage", tmpEnvPath) + mgmtEnvironmentPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_STACK, "mgmt") + stageEnvironmentPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_STACK, "stage") runTerragrunt(t, fmt.Sprintf("terragrunt apply-all --terragrunt-non-interactive --terragrunt-working-dir %s", mgmtEnvironmentPath)) runTerragrunt(t, fmt.Sprintf("terragrunt apply-all --terragrunt-non-interactive --terragrunt-working-dir %s", stageEnvironmentPath)) @@ -1218,8 +1221,7 @@ } func TestAutoRetryEnvVarWithRecoverableError(t *testing.T) { - os.Setenv("TERRAGRUNT_NO_AUTO_RETRY", "true") - defer os.Unsetenv("TERRAGRUNT_NO_AUTO_RETRY") + t.Setenv("TERRAGRUNT_NO_AUTO_RETRY", "true") out := new(bytes.Buffer) rootPath := copyEnvironment(t, TEST_FIXTURE_AUTO_RETRY_RERUN) modulePath := util.JoinPath(rootPath, TEST_FIXTURE_AUTO_RETRY_RERUN) @@ -3154,8 +3156,7 @@ tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_DIRS_PATH) rootPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_DIRS_PATH) - os.Setenv("TF_DATA_DIR", util.JoinPath(tmpEnvPath, "data_dir")) - defer os.Unsetenv("TF_DATA_DIR") + t.Setenv("TF_DATA_DIR", util.JoinPath(tmpEnvPath, "data_dir")) var ( stdout bytes.Buffer @@ -4802,7 +4803,8 @@ func TestShowErrorWhenRunAllInvokedWithoutArguments(t *testing.T) { t.Parallel() - appPath := TEST_FIXTURE_STACK + tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_STACK) + appPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_STACK) stdout := bytes.Buffer{} stderr := bytes.Buffer{} @@ -5643,6 +5645,7 @@ t.Parallel() initTestCase := TEST_FIXTURE_INIT_ERROR + cleanupTerraformFolder(t, initTestCase) cleanupTerragruntFolder(t, initTestCase) @@ -5683,7 +5686,9 @@ func TestErrorExplaining(t *testing.T) { t.Parallel() - initTestCase := TEST_FIXTURE_INIT_ERROR + tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_INIT_ERROR) + initTestCase := util.JoinPath(tmpEnvPath, TEST_FIXTURE_INIT_ERROR) + cleanupTerraformFolder(t, initTestCase) cleanupTerragruntFolder(t, initTestCase) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.53.0/test/integration_windows_test.go new/terragrunt-0.53.1/test/integration_windows_test.go --- old/terragrunt-0.53.0/test/integration_windows_test.go 2023-10-27 18:05:16.000000000 +0200 +++ new/terragrunt-0.53.1/test/integration_windows_test.go 2023-10-31 16:48:09.000000000 +0100 @@ -54,7 +54,7 @@ copyEnvironmentToPath(t, fixtureSourceMapPath, targetPath) rootPath := filepath.Join(targetPath, fixtureSourceMapPath) - os.Setenv( + t.Setenv( "TERRAGRUNT_SOURCE_MAP", strings.Join( []string{ ++++++ terragrunt.obsinfo ++++++ --- /var/tmp/diff_new_pack.tUnvaH/_old 2023-11-02 20:22:22.829846031 +0100 +++ /var/tmp/diff_new_pack.tUnvaH/_new 2023-11-02 20:22:22.833846179 +0100 @@ -1,5 +1,5 @@ name: terragrunt -version: 0.53.0 -mtime: 1698422716 -commit: dcbec9f11efae59038c4632116a13c89916dc15c +version: 0.53.1 +mtime: 1698767289 +commit: 5c817c9d0880ce03717303a1ce9e0be59b1f96de ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/terragrunt/vendor.tar.gz /work/SRC/openSUSE:Factory/.terragrunt.new.17445/vendor.tar.gz differ: char 5, line 1