Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package terragrunt for openSUSE:Factory 
checked in at 2023-06-16 16:55:32
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/terragrunt (Old)
 and      /work/SRC/openSUSE:Factory/.terragrunt.new.15902 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "terragrunt"

Fri Jun 16 16:55:32 2023 rev:53 rq:1093426 version:0.47.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/terragrunt/terragrunt.changes    2023-06-13 
16:10:38.659286902 +0200
+++ /work/SRC/openSUSE:Factory/.terragrunt.new.15902/terragrunt.changes 
2023-06-16 16:56:34.870322254 +0200
@@ -1,0 +2,7 @@
+Fri Jun 16 05:13:44 UTC 2023 - ka...@b1-systems.de
+
+- Update to version 0.47.0:
+  * Go upgrade to 1.20 (#2605)
+- BuildRequire go1.20
+
+-------------------------------------------------------------------

Old:
----
  terragrunt-0.46.3.obscpio

New:
----
  terragrunt-0.47.0.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ terragrunt.spec ++++++
--- /var/tmp/diff_new_pack.5PwAGd/_old  2023-06-16 16:56:35.910328390 +0200
+++ /var/tmp/diff_new_pack.5PwAGd/_new  2023-06-16 16:56:35.918328437 +0200
@@ -19,14 +19,14 @@
 %define __arch_install_post export NO_BRP_STRIP_DEBUG=true
 
 Name:           terragrunt
-Version:        0.46.3
+Version:        0.47.0
 Release:        0
 Summary:        Thin wrapper for Terraform for working with multiple Terraform 
modules
 License:        MIT
 URL:            https://github.com/gruntwork-io/terragrunt
 Source:         terragrunt-%{version}.tar.gz
 Source1:        vendor.tar.gz
-BuildRequires:  go >= 1.18
+BuildRequires:  go >= 1.20
 
 %description
 Terragrunt is a thin wrapper for Terraform that provides extra tools for 
keeping your Terraform configurations DRY, working with multiple Terraform 
modules, and managing remote state.

++++++ _service ++++++
--- /var/tmp/diff_new_pack.5PwAGd/_old  2023-06-16 16:56:35.950328626 +0200
+++ /var/tmp/diff_new_pack.5PwAGd/_new  2023-06-16 16:56:35.954328649 +0200
@@ -3,7 +3,7 @@
     <param name="url">https://github.com/gruntwork-io/terragrunt</param>
     <param name="scm">git</param>
     <param name="exclude">.git</param>
-    <param name="revision">v0.46.3</param>
+    <param name="revision">v0.47.0</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.5PwAGd/_old  2023-06-16 16:56:35.970328743 +0200
+++ /var/tmp/diff_new_pack.5PwAGd/_new  2023-06-16 16:56:35.974328767 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/gruntwork-io/terragrunt</param>
-              <param 
name="changesrevision">d59c964f36a32f2b73217e6306b07056cd473054</param></service></servicedata>
+              <param 
name="changesrevision">1d181090e511602cf5462f845bc854f540bc9f14</param></service></servicedata>
 (No newline at EOF)
 

++++++ terragrunt-0.46.3.obscpio -> terragrunt-0.47.0.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/.circleci/config.yml 
new/terragrunt-0.47.0/.circleci/config.yml
--- old/terragrunt-0.46.3/.circleci/config.yml  2023-06-07 21:09:12.000000000 
+0200
+++ new/terragrunt-0.47.0/.circleci/config.yml  2023-06-15 22:15:20.000000000 
+0200
@@ -4,7 +4,7 @@
 
 defaults: &defaults
   docker:
-    - image: 
087285199408.dkr.ecr.us-east-1.amazonaws.com/circle-ci-test-image-base:go1.18-tf1.4-tg39.1-pck1.8-ci50.7
+    - image: 
087285199408.dkr.ecr.us-east-1.amazonaws.com/circle-ci-test-image-base:go1.20-tf1.4-tg39.1-pck1.8-ci50.7
 
 version: 2.1
 jobs:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/_ci/install-golang.ps1 
new/terragrunt-0.47.0/_ci/install-golang.ps1
--- old/terragrunt-0.46.3/_ci/install-golang.ps1        2023-06-07 
21:09:12.000000000 +0200
+++ new/terragrunt-0.47.0/_ci/install-golang.ps1        2023-06-15 
22:15:20.000000000 +0200
@@ -1,5 +1,5 @@
 # Install golang using Chocolatey
-choco install golang --version 1.18.5 -y
+choco install golang --version 1.20.0 -y
 # Verify installation
 Get-Command go
 go version
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/aws_helper/config.go 
new/terragrunt-0.47.0/aws_helper/config.go
--- old/terragrunt-0.46.3/aws_helper/config.go  2023-06-07 21:09:12.000000000 
+0200
+++ new/terragrunt-0.47.0/aws_helper/config.go  2023-06-15 22:15:20.000000000 
+0200
@@ -110,9 +110,10 @@
 }
 
 // Returns an AWS session object. The session is configured by either:
-// - The provided AwsSessionConfig struct, which specifies region (required), 
profile name (optional), and IAM role to
-//   assume (optional).
-// - The provided TerragruntOptions struct, which specifies any IAM role to 
assume (optional).
+//   - The provided AwsSessionConfig struct, which specifies region 
(required), profile name (optional), and IAM role to
+//     assume (optional).
+//   - The provided TerragruntOptions struct, which specifies any IAM role to 
assume (optional).
+//
 // Note that if the AwsSessionConfig object is null, this will return default 
session credentials using the default
 // credentials chain of the AWS SDK.
 func CreateAwsSession(config *AwsSessionConfig, terragruntOptions 
*options.TerragruntOptions) (*session.Session, error) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/cli/aws_provider_patch.go 
new/terragrunt-0.47.0/cli/aws_provider_patch.go
--- old/terragrunt-0.46.3/cli/aws_provider_patch.go     2023-06-07 
21:09:12.000000000 +0200
+++ new/terragrunt-0.47.0/cli/aws_provider_patch.go     2023-06-15 
22:15:20.000000000 +0200
@@ -33,23 +33,23 @@
 //
 // For example, if were running Terragrunt against code that contained a 
module:
 //
-// module "example" {
-//   source = "<URL>"
-// }
+//     module "example" {
+//       source = "<URL>"
+//     }
 //
 // When you run 'init', Terraform would download the code for that module into 
.terraform/modules. This function would
 // scan that module code for provider blocks:
 //
-// provider "aws" {
-//    region = var.aws_region
-// }
+//     provider "aws" {
+//        region = var.aws_region
+//     }
 //
 // And if AwsProviderPatchOverrides in terragruntOptions was set to 
map[string]string{"region": "us-east-1"}, then this
 // method would update the module code to:
 //
-// provider "aws" {
-//    region = "us-east-1"
-// }
+//     provider "aws" {
+//        region = "us-east-1"
+//     }
 //
 // This is a temporary workaround for a Terraform bug 
(https://github.com/hashicorp/terraform/issues/13018) where
 // any dynamic values in nested provider blocks are not handled correctly when 
you call 'terraform import', so by
@@ -158,15 +158,15 @@
 //
 // For example, if you passed in the following Terraform code:
 //
-// provider "aws" {
-//    region = var.aws_region
-// }
+//     provider "aws" {
+//        region = var.aws_region
+//     }
 //
 // And you set attributesToOverride to map[string]string{"region": 
"us-east-1"}, then this method will return:
 //
-// provider "aws" {
-//    region = "us-east-1"
-// }
+//     provider "aws" {
+//        region = "us-east-1"
+//     }
 //
 // This is a temporary workaround for a Terraform bug 
(https://github.com/hashicorp/terraform/issues/13018) where
 // any dynamic values in nested provider blocks are not handled correctly when 
you call 'terraform import', so by
@@ -209,12 +209,12 @@
 //
 // Assume that block1 is:
 //
-// provider "aws" {
-//   region = var.aws_region
-//   assume_role {
-//     role_arn = var.role_arn
-//   }
-// }
+//     provider "aws" {
+//       region = var.aws_region
+//       assume_role {
+//         role_arn = var.role_arn
+//       }
+//     }
 //
 // If you call:
 //
@@ -223,12 +223,12 @@
 //
 // The result would be:
 //
-// provider "aws" {
-//   region = "eu-west-1"
-//   assume_role {
-//     role_arn = "foo"
-//   }
-// }
+//     provider "aws" {
+//       region = "eu-west-1"
+//       assume_role {
+//         role_arn = "foo"
+//       }
+//     }
 //
 // Assume block2 is:
 //
@@ -239,7 +239,6 @@
 // overrideAttributeInBlock(block2, "region", "eu-west-1")
 // overrideAttributeInBlock(block2, "assume_role.role_arn", "foo")
 //
-//
 // The result would be:
 //
 // provider "aws" {}
@@ -285,24 +284,28 @@
 //
 // Assume block is:
 //
-// provider "aws" {
-//   region = var.aws_region
-//   assume_role {
-//     role_arn = var.role_arn
-//   }
-// }
+//     provider "aws" {
+//       region = var.aws_region
+//       assume_role {
+//         role_arn = var.role_arn
+//       }
+//     }
 //
 // traverseBlock(block, []string{"region"})
-//   => returns (<body of the current block>, "region")
+//
+//     => returns (<body of the current block>, "region")
 //
 // traverseBlock(block, []string{"assume_role", "role_arn"})
-//   => returns (<body of the nested assume_role block>, "role_arn")
+//
+//     => returns (<body of the nested assume_role block>, "role_arn")
 //
 // traverseBlock(block, []string{"foo"})
-//   => returns (nil, "")
+//
+//     => returns (nil, "")
 //
 // traverseBlock(block, []string{"assume_role", "foo"})
-//   => returns (nil, "")
+//
+//     => returns (nil, "")
 func traverseBlock(block *hclwrite.Block, keyParts []string) (*hclwrite.Body, 
string) {
        if block == nil {
                return nil, ""
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/config/include.go 
new/terragrunt-0.47.0/config/include.go
--- old/terragrunt-0.46.3/config/include.go     2023-06-07 21:09:12.000000000 
+0200
+++ new/terragrunt-0.47.0/config/include.go     2023-06-15 22:15:20.000000000 
+0200
@@ -242,7 +242,8 @@
 // attributes defined in the targetConfig. Note that this will modify the 
targetConfig.
 // NOTE: the following attributes are deliberately omitted from the merge 
operation, as they are handled differently in
 // the parser:
-//     - locals [These blocks are not merged by design]
+//   - locals [These blocks are not merged by design]
+//
 // NOTE: dependencies block is a special case and is merged deeply. This is 
necessary to ensure the configstack system
 // works correctly, as it uses the `Dependencies` list to track the 
dependencies of modules for graph building purposes.
 // This list includes the dependencies added from dependency blocks, which is 
handled in a different stage.
@@ -337,19 +338,19 @@
 }
 
 // DeepMerge performs a deep merge of the given sourceConfig into the 
targetConfig. Deep merge is defined as follows:
-// - For simple types, the source overrides the target.
-// - For lists, the two attribute lists are combined together in concatenation.
-// - For maps, the two maps are combined together recursively. That is, if the 
map keys overlap, then a deep merge is
-//   performed on the map value.
-// - Note that some structs are not deep mergeable due to an implementation 
detail. This will change in the future. The
-//   following structs have this limitation:
-//     - remote_state
-//     - generate
-// - Note that the following attributes are deliberately omitted from the 
merge operation, as they are handled
-//   differently in the parser:
-//     - dependency blocks (TerragruntDependencies) [These blocks need to 
retrieve outputs, so we need to merge during
-//       the parsing step, not after the full config is decoded]
-//     - locals [These blocks are not merged by design]
+//   - For simple types, the source overrides the target.
+//   - For lists, the two attribute lists are combined together in 
concatenation.
+//   - For maps, the two maps are combined together recursively. That is, if 
the map keys overlap, then a deep merge is
+//     performed on the map value.
+//   - Note that some structs are not deep mergeable due to an implementation 
detail. This will change in the future. The
+//     following structs have this limitation:
+//   - remote_state
+//   - generate
+//   - Note that the following attributes are deliberately omitted from the 
merge operation, as they are handled
+//     differently in the parser:
+//   - dependency blocks (TerragruntDependencies) [These blocks need to 
retrieve outputs, so we need to merge during
+//     the parsing step, not after the full config is decoded]
+//   - locals [These blocks are not merged by design]
 func (targetConfig *TerragruntConfig) DeepMerge(sourceConfig 
*TerragruntConfig, terragruntOptions *options.TerragruntOptions) error {
        // Merge simple attributes first
        if sourceConfig.DownloadDir != "" {
@@ -738,37 +739,42 @@
 // block:
 //
 // Case 1: a single include block as top level:
-// {
-//   "include": {
-//     "path": "foo"
-//   }
-// }
+//
+//     {
+//       "include": {
+//         "path": "foo"
+//       }
+//     }
 //
 // Case 2: a single include block in list:
-// {
-//   "include": [
-//     {"path": "foo"}
-//   ]
-// }
+//
+//     {
+//       "include": [
+//         {"path": "foo"}
+//       ]
+//     }
 //
 // Case 3: mixed bare and labeled include block as list:
-// {
-//   "include": [
-//     {"path": "foo"},
-//     {
-//       "labeled": {"path": "bar"}
-//     }
-//   ]
-// }
+//
+//     {
+//       "include": [
+//         {"path": "foo"},
+//         {
+//           "labeled": {"path": "bar"}
+//         }
+//       ]
+//     }
 //
 // For simplicity of implementation, we focus on handling Case 1 and 2, and 
ignore Case 3. If we see Case 3, we will
 // error out. Instead, the user should handle this case explicitly using the 
object encoding instead of list encoding:
-// {
-//   "include": {
-//     "": {"path": "foo"},
-//     "labeled": {"path": "bar"}
-//   }
-// }
+//
+//     {
+//       "include": {
+//         "": {"path": "foo"},
+//         "labeled": {"path": "bar"}
+//       }
+//     }
+//
 // If the multiple include blocks are encoded in this way in the json 
configuration, nothing needs to be done by this
 // function.
 func updateBareIncludeBlockJSON(fileBytes []byte) ([]byte, bool, error) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/config/locals.go 
new/terragrunt-0.47.0/config/locals.go
--- old/terragrunt-0.46.3/config/locals.go      2023-06-07 21:09:12.000000000 
+0200
+++ new/terragrunt-0.47.0/config/locals.go      2023-06-15 22:15:20.000000000 
+0200
@@ -36,9 +36,10 @@
 
 // evaluateLocalsBlock is a routine to evaluate the locals block in a way to 
allow references to other locals. This
 // will:
-// - Extract a reference to the locals block from the parsed file
-// - Continuously evaluate the block until all references are evaluated, 
defering evaluation of anything that references
-//   other locals until those references are evaluated.
+//   - Extract a reference to the locals block from the parsed file
+//   - Continuously evaluate the block until all references are evaluated, 
defering evaluation of anything that references
+//     other locals until those references are evaluated.
+//
 // This returns a map of the local names to the evaluated expressions 
(represented as `cty.Value` objects). This will
 // error if there are remaining unevaluated locals after all references that 
can be evaluated has been evaluated.
 func evaluateLocalsBlock(
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/configstack/running_module.go 
new/terragrunt-0.47.0/configstack/running_module.go
--- old/terragrunt-0.46.3/configstack/running_module.go 2023-06-07 
21:09:12.000000000 +0200
+++ new/terragrunt-0.47.0/configstack/running_module.go 2023-06-15 
22:15:20.000000000 +0200
@@ -103,10 +103,10 @@
 
 // Loop through the map of runningModules and for each module M:
 //
-// * If dependencyOrder is NormalOrder, plug in all the modules M depends on 
into the Dependencies field and all the
-//   modules that depend on M into the NotifyWhenDone field.
-// * If dependencyOrder is ReverseOrder, do the reverse.
-// * If dependencyOrder is IgnoreOrder, do nothing.
+//   - If dependencyOrder is NormalOrder, plug in all the modules M depends on 
into the Dependencies field and all the
+//     modules that depend on M into the NotifyWhenDone field.
+//   - If dependencyOrder is ReverseOrder, do the reverse.
+//   - If dependencyOrder is IgnoreOrder, do nothing.
 func crossLinkDependencies(modules map[string]*runningModule, dependencyOrder 
DependencyOrder) (map[string]*runningModule, error) {
        for _, module := range modules {
                for _, dependency := range module.Module.Dependencies {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/go.mod new/terragrunt-0.47.0/go.mod
--- old/terragrunt-0.46.3/go.mod        2023-06-07 21:09:12.000000000 +0200
+++ new/terragrunt-0.47.0/go.mod        2023-06-15 22:15:20.000000000 +0200
@@ -1,6 +1,6 @@
 module github.com/gruntwork-io/terragrunt
 
-go 1.18
+go 1.20
 
 require (
        cloud.google.com/go/storage v1.27.0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/remote/remote_state_s3_test.go 
new/terragrunt-0.47.0/remote/remote_state_s3_test.go
--- old/terragrunt-0.46.3/remote/remote_state_s3_test.go        2023-06-07 
21:09:12.000000000 +0200
+++ new/terragrunt-0.47.0/remote/remote_state_s3_test.go        2023-06-15 
22:15:20.000000000 +0200
@@ -351,7 +351,7 @@
 }
 
 // Test to validate cases when is not possible to read all S3 configurations
-//https://github.com/gruntwork-io/terragrunt/issues/2109
+// https://github.com/gruntwork-io/terragrunt/issues/2109
 func TestNegativePublicAccessResponse(t *testing.T) {
        t.Parallel()
        testCases := []struct {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terragrunt-0.46.3/util/reflect.go 
new/terragrunt-0.47.0/util/reflect.go
--- old/terragrunt-0.46.3/util/reflect.go       2023-06-07 21:09:12.000000000 
+0200
+++ new/terragrunt-0.47.0/util/reflect.go       2023-06-15 22:15:20.000000000 
+0200
@@ -15,22 +15,23 @@
 }
 
 // MustWalkTerraformOutput is a helper utility to deeply return a value from a 
terraform output.
-//   nil will be returned if the path is invalid
 //
-//   Using an example terraform output:
-//     a = {
-//       b = {
-//         c = "foo"
-//       }
-//       "d" = [
-//         1,
-//         2
-//       ]
-//     }
+//     nil will be returned if the path is invalid
 //
-//   path ["a", "b", "c"] will return "foo"
-//   path ["a", "d", "1"] will return 2
-//   path ["a", "foo"] will return nil
+//     Using an example terraform output:
+//       a = {
+//         b = {
+//           c = "foo"
+//         }
+//         "d" = [
+//           1,
+//           2
+//         ]
+//       }
+//
+//     path ["a", "b", "c"] will return "foo"
+//     path ["a", "d", "1"] will return 2
+//     path ["a", "foo"] will return nil
 func MustWalkTerraformOutput(value interface{}, path ...string) interface{} {
        if value == nil {
                return nil

++++++ terragrunt.obsinfo ++++++
--- /var/tmp/diff_new_pack.5PwAGd/_old  2023-06-16 16:56:36.622332590 +0200
+++ /var/tmp/diff_new_pack.5PwAGd/_new  2023-06-16 16:56:36.626332613 +0200
@@ -1,5 +1,5 @@
 name: terragrunt
-version: 0.46.3
-mtime: 1686164952
-commit: d59c964f36a32f2b73217e6306b07056cd473054
+version: 0.47.0
+mtime: 1686860120
+commit: 1d181090e511602cf5462f845bc854f540bc9f14
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/terragrunt/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.terragrunt.new.15902/vendor.tar.gz differ: char 5, 
line 1

Reply via email to