Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package terragrunt for openSUSE:Factory 
checked in at 2023-11-02 20:22:06
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/terragrunt (Old)
 and      /work/SRC/openSUSE:Factory/.terragrunt.new.17445 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "terragrunt"

Thu Nov  2 20:22:06 2023 rev:79 rq:1121767 version:0.53.1

Changes:
--------
--- /work/SRC/openSUSE:Factory/terragrunt/terragrunt.changes    2023-10-30 
22:11:12.585156045 +0100
+++ /work/SRC/openSUSE:Factory/.terragrunt.new.17445/terragrunt.changes 
2023-11-02 20:22:20.901775087 +0100
@@ -1,0 +2,8 @@
+Thu Nov 02 05:59:43 UTC 2023 - ka...@b1-systems.de
+
+- Update to version 0.53.1:
+  * Update aws-sdk to support SSO (#2774)
+  * Add Default Retryable Error List to Docs (#2771)
+  * test: use `T.Setenv` to set env vars in tests (#2205)
+
+-------------------------------------------------------------------

Old:
----
  terragrunt-0.53.0.obscpio

New:
----
  terragrunt-0.53.1.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ terragrunt.spec ++++++
--- /var/tmp/diff_new_pack.tUnvaH/_old  2023-11-02 20:22:22.029816594 +0100
+++ /var/tmp/diff_new_pack.tUnvaH/_new  2023-11-02 20:22:22.029816594 +0100
@@ -19,7 +19,7 @@
 %define __arch_install_post export NO_BRP_STRIP_DEBUG=true
 
 Name:           terragrunt
-Version:        0.53.0
+Version:        0.53.1
 Release:        0
 Summary:        Thin wrapper for Terraform for working with multiple Terraform 
modules
 License:        MIT

++++++ _service ++++++
--- /var/tmp/diff_new_pack.tUnvaH/_old  2023-11-02 20:22:22.057817624 +0100
+++ /var/tmp/diff_new_pack.tUnvaH/_new  2023-11-02 20:22:22.057817624 +0100
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/gruntwork-io/terragrunt</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.53.0</param>
+    <param name="revision">v0.53.1</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.tUnvaH/_old  2023-11-02 20:22:22.073818213 +0100
+++ /var/tmp/diff_new_pack.tUnvaH/_new  2023-11-02 20:22:22.077818360 +0100
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/gruntwork-io/terragrunt</param>
-              <param 
name="changesrevision">dcbec9f11efae59038c4632116a13c89916dc15c</param></service></servicedata>
+              <param 
name="changesrevision">5c817c9d0880ce03717303a1ce9e0be59b1f96de</param></service></servicedata>
 (No newline at EOF)
 

++++++ terragrunt-0.53.0.obscpio -> terragrunt-0.53.1.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terragrunt-0.53.0/docs/_docs/04_reference/config-blocks-and-attributes.md 
new/terragrunt-0.53.1/docs/_docs/04_reference/config-blocks-and-attributes.md
--- 
old/terragrunt-0.53.0/docs/_docs/04_reference/config-blocks-and-attributes.md   
    2023-10-27 18:05:16.000000000 +0200
+++ 
new/terragrunt-0.53.1/docs/_docs/04_reference/config-blocks-and-attributes.md   
    2023-10-31 16:48:09.000000000 +0100
@@ -1260,6 +1260,26 @@
 The terragrunt `retryable_errors` list can be used to override the default 
list of retryable errors with your own custom list.
 To learn more about the `retryable_errors` attribute, see the [auto-retry 
feature overview](/docs/features/auto-retry).
 
+Default List:
+
+```hcl
+retryable_errors = [
+  "(?s).*Failed to load state.*tcp.*timeout.*",
+  "(?s).*Failed to load backend.*TLS handshake timeout.*",
+  "(?s).*Creating metric alarm failed.*request to update this alarm is in 
progress.*",
+  "(?s).*Error installing provider.*TLS handshake timeout.*",
+  "(?s).*Error configuring the backend.*TLS handshake timeout.*",
+  "(?s).*Error installing provider.*tcp.*timeout.*",
+  "(?s).*Error installing provider.*tcp.*connection reset by peer.*",
+  "NoSuchBucket: The specified bucket does not exist",
+  "(?s).*Error creating SSM parameter: TooManyUpdates:.*",
+  "(?s).*app.terraform.io.*: 429 Too Many Requests.*",
+  "(?s).*ssh_exchange_identification.*Connection closed by remote host.*",
+  "(?s).*Client\\.Timeout exceeded while awaiting headers.*",
+  "(?s).*Could not download module.*The requested URL returned error: 429.*",
+]
+```
+
 Example:
 
 ```hcl
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.53.0/go.mod new/terragrunt-0.53.1/go.mod
--- old/terragrunt-0.53.0/go.mod        2023-10-27 18:05:16.000000000 +0200
+++ new/terragrunt-0.53.1/go.mod        2023-10-31 16:48:09.000000000 +0100
@@ -4,7 +4,7 @@
 
 require (
        cloud.google.com/go/storage v1.28.1
-       github.com/aws/aws-sdk-go v1.44.122
+       github.com/aws/aws-sdk-go v1.46.6
        github.com/creack/pty v1.1.11
        github.com/fatih/structs v1.1.0
        github.com/go-errors/errors v1.4.2
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.53.0/go.sum new/terragrunt-0.53.1/go.sum
--- old/terragrunt-0.53.0/go.sum        2023-10-27 18:05:16.000000000 +0200
+++ new/terragrunt-0.53.1/go.sum        2023-10-31 16:48:09.000000000 +0100
@@ -296,8 +296,9 @@
 github.com/aws/aws-sdk-go v1.15.78/go.mod 
h1:E3/ieXAlvM0XWO57iftYVDLLvQ824smPP3ATZkfNZeM=
 github.com/aws/aws-sdk-go v1.31.9/go.mod 
h1:5zCpMtNQVjRREroY7sYe8lOMRSxkhG6MZveU8YkpAk0=
 github.com/aws/aws-sdk-go v1.37.0/go.mod 
h1:hcU610XS61/+aQV88ixoOzUoG7v3b31pl2zKMmprdro=
-github.com/aws/aws-sdk-go v1.44.122 
h1:p6mw01WBaNpbdP2xrisz5tIkcNwzj/HysobNoaAHjgo=
 github.com/aws/aws-sdk-go v1.44.122/go.mod 
h1:y4AeaBuwd2Lk+GepC1E9v0qOiTws0MIWAX4oIKwKHZo=
+github.com/aws/aws-sdk-go v1.46.6 
h1:6wFnNC9hETIZLMf6SOTN7IcclrOGwp/n9SLp8Pjt6E8=
+github.com/aws/aws-sdk-go v1.46.6/go.mod 
h1:aVsgQcEevwlmQ7qHE9I3h+dtQgpqhFB+i8Phjh7fkwI=
 github.com/baiyubin/aliyun-sts-go-sdk 
v0.0.0-20180326062324-cfa1a18b161f/go.mod 
h1:AuiFmCCPBSrqvVMvuqFuk0qogytodnVFVSN5CeJB8Gc=
 github.com/beorn7/perks v0.0.0-20180321164747-3a771d992973/go.mod 
h1:Dwedo/Wpr24TaqPxmxbtue+5NUziq4I4S80YR8gNf3Q=
 github.com/beorn7/perks v1.0.0/go.mod 
h1:KWe93zE9D1o94FZ5RNwFwVgaQK1VOXiVxmqh+CedLV8=
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.53.0/test/integration_serial_test.go 
new/terragrunt-0.53.1/test/integration_serial_test.go
--- old/terragrunt-0.53.0/test/integration_serial_test.go       2023-10-27 
18:05:16.000000000 +0200
+++ new/terragrunt-0.53.1/test/integration_serial_test.go       2023-10-31 
16:48:09.000000000 +0100
@@ -79,11 +79,8 @@
                testCase := testCase
 
                t.Run(testCase.name, func(t *testing.T) {
-                       // make sure the env var doesn't leak outside of this 
test case
-                       defer os.Unsetenv("TERRAGRUNT_DOWNLOAD")
-
                        if testCase.downloadDirEnv != "" {
-                               require.NoError(t, 
os.Setenv("TERRAGRUNT_DOWNLOAD", testCase.downloadDirEnv))
+                               t.Setenv("TERRAGRUNT_DOWNLOAD", 
testCase.downloadDirEnv)
                        } else {
                                // Clear the variable if it's not set. This is 
clearing the variable in case the variable is set outside the test process.
                                require.NoError(t, 
os.Unsetenv("TERRAGRUNT_DOWNLOAD"))
@@ -140,8 +137,7 @@
 
 func TestExtraArgumentsWithEnv(t *testing.T) {
        out := new(bytes.Buffer)
-       os.Setenv("TF_VAR_env", "prod")
-       defer os.Unsetenv("TF_VAR_env")
+       t.Setenv("TF_VAR_env", "prod")
        runTerragruntRedirectOutput(t, fmt.Sprintf("terragrunt apply 
-auto-approve --terragrunt-non-interactive --terragrunt-working-dir %s", 
TEST_FIXTURE_EXTRA_ARGS_PATH), out, os.Stderr)
        t.Log(out.String())
        assert.Contains(t, out.String(), "Hello, World!")
@@ -156,16 +152,14 @@
 
 func TestExtraArgumentsWithRegion(t *testing.T) {
        out := new(bytes.Buffer)
-       os.Setenv("TF_VAR_region", "us-west-2")
-       defer os.Unsetenv("TF_VAR_region")
+       t.Setenv("TF_VAR_region", "us-west-2")
        runTerragruntRedirectOutput(t, fmt.Sprintf("terragrunt apply 
-auto-approve --terragrunt-non-interactive --terragrunt-working-dir %s", 
TEST_FIXTURE_EXTRA_ARGS_PATH), out, os.Stderr)
        t.Log(out.String())
        assert.Contains(t, out.String(), "Hello, World from Oregon!")
 }
 
 func TestPreserveEnvVarApplyAll(t *testing.T) {
-       os.Setenv("TF_VAR_seed", "from the env")
-       defer os.Unsetenv("TF_VAR_seed")
+       t.Setenv("TF_VAR_seed", "from the env")
 
        cleanupTerraformFolder(t, TEST_FIXTURE_REGRESSIONS)
        tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_REGRESSIONS)
@@ -197,16 +191,14 @@
 }
 
 func TestTerragruntValidateInputsWithEnvVar(t *testing.T) {
-       os.Setenv("TF_VAR_input", "from the env")
-       defer os.Unsetenv("TF_VAR_input")
+       t.Setenv("TF_VAR_input", "from the env")
 
        moduleDir := filepath.Join("fixture-validate-inputs", "fail-no-inputs")
        runTerragruntValidateInputs(t, moduleDir, nil, true)
 }
 
 func TestTerragruntValidateInputsWithUnusedEnvVar(t *testing.T) {
-       os.Setenv("TF_VAR_unused", "from the env")
-       defer os.Unsetenv("TF_VAR_unused")
+       t.Setenv("TF_VAR_unused", "from the env")
 
        moduleDir := filepath.Join("fixture-validate-inputs", 
"success-inputs-only")
        args := []string{"--terragrunt-strict-validate"}
@@ -219,7 +211,7 @@
        tmpEnvPath := copyEnvironment(t, fixtureSourceMapPath)
        rootPath := filepath.Join(tmpEnvPath, fixtureSourceMapPath)
 
-       os.Setenv(
+       t.Setenv(
                "TERRAGRUNT_SOURCE_MAP",
                strings.Join(
                        []string{
@@ -236,16 +228,7 @@
 
 func TestTerragruntLogLevelEnvVarOverridesDefault(t *testing.T) {
        // NOTE: this matches logLevelEnvVar const in util/logger.go
-       envVarName := "TERRAGRUNT_LOG_LEVEL"
-       oldVal := os.Getenv(envVarName)
-       defer func() {
-               if oldVal != "" {
-                       os.Setenv(envVarName, oldVal)
-               } else {
-                       os.Unsetenv(envVarName)
-               }
-       }()
-       os.Setenv("TERRAGRUNT_LOG_LEVEL", "debug")
+       t.Setenv("TERRAGRUNT_LOG_LEVEL", "debug")
 
        cleanupTerraformFolder(t, TEST_FIXTURE_INPUTS)
        tmpEnvPath := copyEnvironment(t, ".")
@@ -266,16 +249,7 @@
 
 func TestTerragruntLogLevelEnvVarUnparsableLogsErrorButContinues(t *testing.T) 
{
        // NOTE: this matches logLevelEnvVar const in util/logger.go
-       envVarName := "TERRAGRUNT_LOG_LEVEL"
-       oldVal := os.Getenv(envVarName)
-       defer func() {
-               if oldVal != "" {
-                       os.Setenv(envVarName, oldVal)
-               } else {
-                       os.Unsetenv(envVarName)
-               }
-       }()
-       os.Setenv("TERRAGRUNT_LOG_LEVEL", "unparsable")
+       t.Setenv("TERRAGRUNT_LOG_LEVEL", "unparsable")
 
        cleanupTerraformFolder(t, TEST_FIXTURE_INPUTS)
        tmpEnvPath := copyEnvironment(t, ".")
@@ -354,16 +328,13 @@
 }
 
 func TestTerragruntWorksWithImpersonateGCSBackend(t *testing.T) {
-       defaultCreds := os.Getenv("GOOGLE_APPLICATION_CREDENTIALS")
-       defer os.Setenv("GOOGLE_APPLICATION_CREDENTIALS", defaultCreds)
-
        impersonatorKey := os.Getenv("GCLOUD_SERVICE_KEY_IMPERSONATOR")
        if impersonatorKey == "" {
                t.Fatalf("Required environment variable `%s` - not found", 
"GCLOUD_SERVICE_KEY_IMPERSONATOR")
        }
        tmpImpersonatorCreds := createTmpTerragruntConfigContent(t, 
impersonatorKey, "impersonator-key.json")
        defer removeFile(t, tmpImpersonatorCreds)
-       os.Setenv("GOOGLE_APPLICATION_CREDENTIALS", tmpImpersonatorCreds)
+       t.Setenv("GOOGLE_APPLICATION_CREDENTIALS", tmpImpersonatorCreds)
 
        project := os.Getenv("GOOGLE_CLOUD_PROJECT")
        gcsBucketName := fmt.Sprintf("terragrunt-test-bucket-%s", 
strings.ToLower(uniqueId()))
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.53.0/test/integration_test.go 
new/terragrunt-0.53.1/test/integration_test.go
--- old/terragrunt-0.53.0/test/integration_test.go      2023-10-27 
18:05:16.000000000 +0200
+++ new/terragrunt-0.53.1/test/integration_test.go      2023-10-31 
16:48:09.000000000 +0100
@@ -1050,13 +1050,16 @@
        defer deleteS3Bucket(t, TERRAFORM_REMOTE_STATE_S3_REGION, s3BucketName)
        defer cleanupTableForTest(t, lockTableName, 
TERRAFORM_REMOTE_STATE_S3_REGION)
 
+       cleanupTerraformFolder(t, TEST_FIXTURE_STACK)
+       cleanupTerragruntFolder(t, TEST_FIXTURE_STACK)
+
        tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_STACK)
 
-       rootTerragruntConfigPath := util.JoinPath(tmpEnvPath, "fixture-stack", 
config.DefaultTerragruntConfigPath)
+       rootTerragruntConfigPath := util.JoinPath(tmpEnvPath, 
TEST_FIXTURE_STACK, config.DefaultTerragruntConfigPath)
        copyTerragruntConfigAndFillPlaceholders(t, rootTerragruntConfigPath, 
rootTerragruntConfigPath, s3BucketName, lockTableName, "not-used")
 
-       mgmtEnvironmentPath := fmt.Sprintf("%s/fixture-stack/mgmt", tmpEnvPath)
-       stageEnvironmentPath := fmt.Sprintf("%s/fixture-stack/stage", 
tmpEnvPath)
+       mgmtEnvironmentPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_STACK, 
"mgmt")
+       stageEnvironmentPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_STACK, 
"stage")
 
        runTerragrunt(t, fmt.Sprintf("terragrunt apply-all 
--terragrunt-non-interactive --terragrunt-working-dir %s", mgmtEnvironmentPath))
        runTerragrunt(t, fmt.Sprintf("terragrunt apply-all 
--terragrunt-non-interactive --terragrunt-working-dir %s", 
stageEnvironmentPath))
@@ -1218,8 +1221,7 @@
 }
 
 func TestAutoRetryEnvVarWithRecoverableError(t *testing.T) {
-       os.Setenv("TERRAGRUNT_NO_AUTO_RETRY", "true")
-       defer os.Unsetenv("TERRAGRUNT_NO_AUTO_RETRY")
+       t.Setenv("TERRAGRUNT_NO_AUTO_RETRY", "true")
        out := new(bytes.Buffer)
        rootPath := copyEnvironment(t, TEST_FIXTURE_AUTO_RETRY_RERUN)
        modulePath := util.JoinPath(rootPath, TEST_FIXTURE_AUTO_RETRY_RERUN)
@@ -3154,8 +3156,7 @@
        tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_DIRS_PATH)
        rootPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_DIRS_PATH)
 
-       os.Setenv("TF_DATA_DIR", util.JoinPath(tmpEnvPath, "data_dir"))
-       defer os.Unsetenv("TF_DATA_DIR")
+       t.Setenv("TF_DATA_DIR", util.JoinPath(tmpEnvPath, "data_dir"))
 
        var (
                stdout bytes.Buffer
@@ -4802,7 +4803,8 @@
 func TestShowErrorWhenRunAllInvokedWithoutArguments(t *testing.T) {
        t.Parallel()
 
-       appPath := TEST_FIXTURE_STACK
+       tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_STACK)
+       appPath := util.JoinPath(tmpEnvPath, TEST_FIXTURE_STACK)
 
        stdout := bytes.Buffer{}
        stderr := bytes.Buffer{}
@@ -5643,6 +5645,7 @@
        t.Parallel()
 
        initTestCase := TEST_FIXTURE_INIT_ERROR
+
        cleanupTerraformFolder(t, initTestCase)
        cleanupTerragruntFolder(t, initTestCase)
 
@@ -5683,7 +5686,9 @@
 func TestErrorExplaining(t *testing.T) {
        t.Parallel()
 
-       initTestCase := TEST_FIXTURE_INIT_ERROR
+       tmpEnvPath := copyEnvironment(t, TEST_FIXTURE_INIT_ERROR)
+       initTestCase := util.JoinPath(tmpEnvPath, TEST_FIXTURE_INIT_ERROR)
+
        cleanupTerraformFolder(t, initTestCase)
        cleanupTerragruntFolder(t, initTestCase)
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.53.0/test/integration_windows_test.go 
new/terragrunt-0.53.1/test/integration_windows_test.go
--- old/terragrunt-0.53.0/test/integration_windows_test.go      2023-10-27 
18:05:16.000000000 +0200
+++ new/terragrunt-0.53.1/test/integration_windows_test.go      2023-10-31 
16:48:09.000000000 +0100
@@ -54,7 +54,7 @@
                        copyEnvironmentToPath(t, fixtureSourceMapPath, 
targetPath)
                        rootPath := filepath.Join(targetPath, 
fixtureSourceMapPath)
 
-                       os.Setenv(
+                       t.Setenv(
                                "TERRAGRUNT_SOURCE_MAP",
                                strings.Join(
                                        []string{

++++++ terragrunt.obsinfo ++++++
--- /var/tmp/diff_new_pack.tUnvaH/_old  2023-11-02 20:22:22.829846031 +0100
+++ /var/tmp/diff_new_pack.tUnvaH/_new  2023-11-02 20:22:22.833846179 +0100
@@ -1,5 +1,5 @@
 name: terragrunt
-version: 0.53.0
-mtime: 1698422716
-commit: dcbec9f11efae59038c4632116a13c89916dc15c
+version: 0.53.1
+mtime: 1698767289
+commit: 5c817c9d0880ce03717303a1ce9e0be59b1f96de
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/terragrunt/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.terragrunt.new.17445/vendor.tar.gz differ: char 5, 
line 1

Reply via email to