Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package terragrunt for openSUSE:Factory checked in at 2023-02-02 18:08:52 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/terragrunt (Old) and /work/SRC/openSUSE:Factory/.terragrunt.new.32243 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "terragrunt" Thu Feb 2 18:08:52 2023 rev:27 rq:1062581 version:0.43.1 Changes: -------- --- /work/SRC/openSUSE:Factory/terragrunt/terragrunt.changes 2023-01-20 17:39:34.540818401 +0100 +++ /work/SRC/openSUSE:Factory/.terragrunt.new.32243/terragrunt.changes 2023-02-02 18:19:01.628032101 +0100 @@ -1,0 +2,9 @@ +Thu Feb 02 06:50:01 UTC 2023 - ka...@b1-systems.de + +- Update to version 0.43.1: + * fix AES256 encryption validation (#2337) + * Fix typos (#2406) + * [skip ci] Added FUNDING.yml (#2429) + * Flaky TestInputsToTflintVar fix (#2427) + +------------------------------------------------------------------- Old: ---- terragrunt-0.43.0.tar.gz New: ---- terragrunt-0.43.1.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ terragrunt.spec ++++++ --- /var/tmp/diff_new_pack.s7LsQx/_old 2023-02-02 18:19:02.168035404 +0100 +++ /var/tmp/diff_new_pack.s7LsQx/_new 2023-02-02 18:19:02.172035428 +0100 @@ -19,7 +19,7 @@ %define __arch_install_post export NO_BRP_STRIP_DEBUG=true Name: terragrunt -Version: 0.43.0 +Version: 0.43.1 Release: 0 Summary: Thin wrapper for Terraform for working with multiple Terraform modules License: MIT ++++++ _service ++++++ --- /var/tmp/diff_new_pack.s7LsQx/_old 2023-02-02 18:19:02.208035648 +0100 +++ /var/tmp/diff_new_pack.s7LsQx/_new 2023-02-02 18:19:02.208035648 +0100 @@ -3,7 +3,7 @@ <param name="url">https://github.com/gruntwork-io/terragrunt</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v0.43.0</param> + <param name="revision">v0.43.1</param> <param name="versionformat">@PARENT_TAG@</param> <param name="changesgenerate">enable</param> <param name="versionrewrite-pattern">v(.*)</param> @@ -16,7 +16,7 @@ <param name="compression">gz</param> </service> <service name="go_modules" mode="disabled"> - <param name="archive">terragrunt-0.43.0.tar.gz</param> + <param name="archive">terragrunt-0.43.1.tar.gz</param> </service> </services> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.s7LsQx/_old 2023-02-02 18:19:02.228035770 +0100 +++ /var/tmp/diff_new_pack.s7LsQx/_new 2023-02-02 18:19:02.232035795 +0100 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/gruntwork-io/terragrunt</param> - <param name="changesrevision">01951a68d289fdb509652d87d3ade3460e6e08f4</param></service></servicedata> + <param name="changesrevision">6d8c982af561a93f9e37a92aa9af11e461c50c02</param></service></servicedata> (No newline at EOF) ++++++ terragrunt-0.43.0.tar.gz -> terragrunt-0.43.1.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/.github/FUNDING.yml new/terragrunt-0.43.1/.github/FUNDING.yml --- old/terragrunt-0.43.0/.github/FUNDING.yml 1970-01-01 01:00:00.000000000 +0100 +++ new/terragrunt-0.43.1/.github/FUNDING.yml 2023-01-31 20:57:09.000000000 +0100 @@ -0,0 +1,3 @@ +# These are supported funding model platforms + +github: gruntwork-io diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/config/cache_test.go new/terragrunt-0.43.1/config/cache_test.go --- old/terragrunt-0.43.0/config/cache_test.go 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/config/cache_test.go 2023-01-31 20:57:09.000000000 +0100 @@ -59,7 +59,7 @@ assert.Empty(t, actualResult) stubTerragruntConfig := TerragruntConfig{ - IsPartial: true, // Any random property will be sufficent + IsPartial: true, // Any random property will be sufficient } cache.Put(testCacheKey, stubTerragruntConfig) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/config/dependency.go new/terragrunt-0.43.1/config/dependency.go --- old/terragrunt-0.43.0/config/dependency.go 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/config/dependency.go 2023-01-31 20:57:09.000000000 +0100 @@ -385,7 +385,7 @@ } // Return the output from the state of another module, managed by terragrunt. This function will parse the provided -// terragrunt config and extract the desired output from the remote state. Note that this will error if the targetted +// terragrunt config and extract the desired output from the remote state. Note that this will error if the targeted // module hasn't been applied yet. func getTerragruntOutput(dependencyConfig Dependency, terragruntOptions *options.TerragruntOptions) (*cty.Value, bool, error) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/internal/tfr/errors.go new/terragrunt-0.43.1/internal/tfr/errors.go --- old/terragrunt-0.43.0/internal/tfr/errors.go 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/internal/tfr/errors.go 2023-01-31 20:57:09.000000000 +0100 @@ -31,7 +31,7 @@ return fmt.Sprintf("Error downloading module from %s: %s", err.sourceURL, err.details) } -// RegistryAPIErr is returned if we get an unsuccesful HTTP return code from the registry. +// RegistryAPIErr is returned if we get an unsuccessful HTTP return code from the registry. type RegistryAPIErr struct { url string statusCode int diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/internal/tfr/getter.go new/terragrunt-0.43.1/internal/tfr/getter.go --- old/terragrunt-0.43.0/internal/tfr/getter.go 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/internal/tfr/getter.go 2023-01-31 20:57:09.000000000 +0100 @@ -228,7 +228,7 @@ func getTerraformGetHeader(ctx context.Context, url url.URL) (string, error) { _, header, err := httpGETAndGetResponse(ctx, url) if err != nil { - details := "error recieving HTTP data" + details := "error receiving HTTP data" return "", errors.WithStackTrace(ModuleDownloadErr{sourceURL: url.String(), details: details}) } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/options/options.go new/terragrunt-0.43.1/options/options.go --- old/terragrunt-0.43.0/options/options.go 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/options/options.go 2023-01-31 20:57:09.000000000 +0100 @@ -96,7 +96,7 @@ // Terraform in that temporary folder Source string - // Map to replace terraform source locations. This will replace occurences of the given source with the target + // Map to replace terraform source locations. This will replace occurrences of the given source with the target // value. SourceMap map[string]string diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/remote/remote_state_s3.go new/terragrunt-0.43.1/remote/remote_state_s3.go --- old/terragrunt-0.43.0/remote/remote_state_s3.go 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/remote/remote_state_s3.go 2023-01-31 20:57:09.000000000 +0100 @@ -529,7 +529,7 @@ } if !config.SkipBucketSSEncryption { - enabled, err := checkIfSSEForS3Enabled(s3Client, &config.remoteStateConfigS3, terragruntOptions) + enabled, err := checkIfSSEForS3Enabled(s3Client, config, terragruntOptions) if err != nil { return false, configBucket, err } @@ -1118,13 +1118,13 @@ return algorithm } -func checkIfSSEForS3Enabled(s3Client *s3.S3, config *RemoteStateConfigS3, terragruntOptions *options.TerragruntOptions) (bool, error) { - terragruntOptions.Logger.Debugf("Checking if SSE is enabled for AWS S3 bucket %s", config.Bucket) +func checkIfSSEForS3Enabled(s3Client *s3.S3, config *ExtendedRemoteStateConfigS3, terragruntOptions *options.TerragruntOptions) (bool, error) { + terragruntOptions.Logger.Debugf("Checking if SSE is enabled for AWS S3 bucket %s", config.remoteStateConfigS3.Bucket) - input := &s3.GetBucketEncryptionInput{Bucket: aws.String(config.Bucket)} + input := &s3.GetBucketEncryptionInput{Bucket: aws.String(config.remoteStateConfigS3.Bucket)} output, err := s3Client.GetBucketEncryption(input) if err != nil { - terragruntOptions.Logger.Debugf("Error checking if SSE is enabled for AWS S3 bucket %s: %s", config.Bucket, err.Error()) + terragruntOptions.Logger.Debugf("Error checking if SSE is enabled for AWS S3 bucket %s: %s", config.remoteStateConfigS3.Bucket, err.Error()) return false, nil } @@ -1135,7 +1135,7 @@ for _, rule := range output.ServerSideEncryptionConfiguration.Rules { if rule.ApplyServerSideEncryptionByDefault != nil { if rule.ApplyServerSideEncryptionByDefault.SSEAlgorithm != nil { - if *rule.ApplyServerSideEncryptionByDefault.SSEAlgorithm == s3.ServerSideEncryptionAwsKms { + if *rule.ApplyServerSideEncryptionByDefault.SSEAlgorithm == config.BucketSSEAlgorithm { return true, nil } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/test/fixture-gcs-byo-bucket/terragrunt.hcl new/terragrunt-0.43.1/test/fixture-gcs-byo-bucket/terragrunt.hcl --- old/terragrunt-0.43.0/test/fixture-gcs-byo-bucket/terragrunt.hcl 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/test/fixture-gcs-byo-bucket/terragrunt.hcl 2023-01-31 20:57:09.000000000 +0100 @@ -3,7 +3,7 @@ backend = "gcs" config = { - # we are explictly testing that a GCS bucket already exists and terragrunt should + # we are explicitly testing that a GCS bucket already exists and terragrunt should # work without project and location. #project = "" #location = "" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/tflint/tflint_test.go new/terragrunt-0.43.1/tflint/tflint_test.go --- old/terragrunt-0.43.0/tflint/tflint_test.go 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/tflint/tflint_test.go 2023-01-31 20:57:09.000000000 +0100 @@ -35,6 +35,6 @@ for _, testCase := range testCases { actual, err := inputsToTflintVar(testCase.inputs) assert.NoError(t, err) - assert.Equal(t, testCase.expected, actual) + assert.ElementsMatch(t, testCase.expected, actual) } } diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.43.0/util/file.go new/terragrunt-0.43.1/util/file.go --- old/terragrunt-0.43.0/util/file.go 2023-01-19 16:02:25.000000000 +0100 +++ new/terragrunt-0.43.1/util/file.go 2023-01-31 20:57:09.000000000 +0100 @@ -364,7 +364,7 @@ // ContainsPath returns true if path contains the given subpath // E.g. path="foo/bar/bee", subpath="bar/bee" -> true -// E.g. path="foo/bar/bee", subpath="bar/be" -> false (becuase be is not a directory) +// E.g. path="foo/bar/bee", subpath="bar/be" -> false (because be is not a directory) func ContainsPath(path, subpath string) bool { splitPath := SplitPath(CleanPath(path)) splitSubpath := SplitPath(CleanPath(subpath)) ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/terragrunt/vendor.tar.gz /work/SRC/openSUSE:Factory/.terragrunt.new.32243/vendor.tar.gz differ: char 5, line 1