Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package terragrunt for openSUSE:Factory checked in at 2023-06-16 16:55:32 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/terragrunt (Old) and /work/SRC/openSUSE:Factory/.terragrunt.new.15902 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "terragrunt" Fri Jun 16 16:55:32 2023 rev:53 rq:1093426 version:0.47.0 Changes: -------- --- /work/SRC/openSUSE:Factory/terragrunt/terragrunt.changes 2023-06-13 16:10:38.659286902 +0200 +++ /work/SRC/openSUSE:Factory/.terragrunt.new.15902/terragrunt.changes 2023-06-16 16:56:34.870322254 +0200 @@ -1,0 +2,7 @@ +Fri Jun 16 05:13:44 UTC 2023 - ka...@b1-systems.de + +- Update to version 0.47.0: + * Go upgrade to 1.20 (#2605) +- BuildRequire go1.20 + +------------------------------------------------------------------- Old: ---- terragrunt-0.46.3.obscpio New: ---- terragrunt-0.47.0.obscpio ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ terragrunt.spec ++++++ --- /var/tmp/diff_new_pack.5PwAGd/_old 2023-06-16 16:56:35.910328390 +0200 +++ /var/tmp/diff_new_pack.5PwAGd/_new 2023-06-16 16:56:35.918328437 +0200 @@ -19,14 +19,14 @@ %define __arch_install_post export NO_BRP_STRIP_DEBUG=true Name: terragrunt -Version: 0.46.3 +Version: 0.47.0 Release: 0 Summary: Thin wrapper for Terraform for working with multiple Terraform modules License: MIT URL: https://github.com/gruntwork-io/terragrunt Source: terragrunt-%{version}.tar.gz Source1: vendor.tar.gz -BuildRequires: go >= 1.18 +BuildRequires: go >= 1.20 %description Terragrunt is a thin wrapper for Terraform that provides extra tools for keeping your Terraform configurations DRY, working with multiple Terraform modules, and managing remote state. ++++++ _service ++++++ --- /var/tmp/diff_new_pack.5PwAGd/_old 2023-06-16 16:56:35.950328626 +0200 +++ /var/tmp/diff_new_pack.5PwAGd/_new 2023-06-16 16:56:35.954328649 +0200 @@ -3,7 +3,7 @@ <param name="url">https://github.com/gruntwork-io/terragrunt</param> <param name="scm">git</param> <param name="exclude">.git</param> - <param name="revision">v0.46.3</param> + <param name="revision">v0.47.0</param> <param name="versionformat">@PARENT_TAG@</param> <param name="changesgenerate">enable</param> <param name="versionrewrite-pattern">v(.*)</param> ++++++ _servicedata ++++++ --- /var/tmp/diff_new_pack.5PwAGd/_old 2023-06-16 16:56:35.970328743 +0200 +++ /var/tmp/diff_new_pack.5PwAGd/_new 2023-06-16 16:56:35.974328767 +0200 @@ -1,6 +1,6 @@ <servicedata> <service name="tar_scm"> <param name="url">https://github.com/gruntwork-io/terragrunt</param> - <param name="changesrevision">d59c964f36a32f2b73217e6306b07056cd473054</param></service></servicedata> + <param name="changesrevision">1d181090e511602cf5462f845bc854f540bc9f14</param></service></servicedata> (No newline at EOF) ++++++ terragrunt-0.46.3.obscpio -> terragrunt-0.47.0.obscpio ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/.circleci/config.yml new/terragrunt-0.47.0/.circleci/config.yml --- old/terragrunt-0.46.3/.circleci/config.yml 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/.circleci/config.yml 2023-06-15 22:15:20.000000000 +0200 @@ -4,7 +4,7 @@ defaults: &defaults docker: - - image: 087285199408.dkr.ecr.us-east-1.amazonaws.com/circle-ci-test-image-base:go1.18-tf1.4-tg39.1-pck1.8-ci50.7 + - image: 087285199408.dkr.ecr.us-east-1.amazonaws.com/circle-ci-test-image-base:go1.20-tf1.4-tg39.1-pck1.8-ci50.7 version: 2.1 jobs: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/_ci/install-golang.ps1 new/terragrunt-0.47.0/_ci/install-golang.ps1 --- old/terragrunt-0.46.3/_ci/install-golang.ps1 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/_ci/install-golang.ps1 2023-06-15 22:15:20.000000000 +0200 @@ -1,5 +1,5 @@ # Install golang using Chocolatey -choco install golang --version 1.18.5 -y +choco install golang --version 1.20.0 -y # Verify installation Get-Command go go version diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/aws_helper/config.go new/terragrunt-0.47.0/aws_helper/config.go --- old/terragrunt-0.46.3/aws_helper/config.go 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/aws_helper/config.go 2023-06-15 22:15:20.000000000 +0200 @@ -110,9 +110,10 @@ } // Returns an AWS session object. The session is configured by either: -// - The provided AwsSessionConfig struct, which specifies region (required), profile name (optional), and IAM role to -// assume (optional). -// - The provided TerragruntOptions struct, which specifies any IAM role to assume (optional). +// - The provided AwsSessionConfig struct, which specifies region (required), profile name (optional), and IAM role to +// assume (optional). +// - The provided TerragruntOptions struct, which specifies any IAM role to assume (optional). +// // Note that if the AwsSessionConfig object is null, this will return default session credentials using the default // credentials chain of the AWS SDK. func CreateAwsSession(config *AwsSessionConfig, terragruntOptions *options.TerragruntOptions) (*session.Session, error) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/cli/aws_provider_patch.go new/terragrunt-0.47.0/cli/aws_provider_patch.go --- old/terragrunt-0.46.3/cli/aws_provider_patch.go 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/cli/aws_provider_patch.go 2023-06-15 22:15:20.000000000 +0200 @@ -33,23 +33,23 @@ // // For example, if were running Terragrunt against code that contained a module: // -// module "example" { -// source = "<URL>" -// } +// module "example" { +// source = "<URL>" +// } // // When you run 'init', Terraform would download the code for that module into .terraform/modules. This function would // scan that module code for provider blocks: // -// provider "aws" { -// region = var.aws_region -// } +// provider "aws" { +// region = var.aws_region +// } // // And if AwsProviderPatchOverrides in terragruntOptions was set to map[string]string{"region": "us-east-1"}, then this // method would update the module code to: // -// provider "aws" { -// region = "us-east-1" -// } +// provider "aws" { +// region = "us-east-1" +// } // // This is a temporary workaround for a Terraform bug (https://github.com/hashicorp/terraform/issues/13018) where // any dynamic values in nested provider blocks are not handled correctly when you call 'terraform import', so by @@ -158,15 +158,15 @@ // // For example, if you passed in the following Terraform code: // -// provider "aws" { -// region = var.aws_region -// } +// provider "aws" { +// region = var.aws_region +// } // // And you set attributesToOverride to map[string]string{"region": "us-east-1"}, then this method will return: // -// provider "aws" { -// region = "us-east-1" -// } +// provider "aws" { +// region = "us-east-1" +// } // // This is a temporary workaround for a Terraform bug (https://github.com/hashicorp/terraform/issues/13018) where // any dynamic values in nested provider blocks are not handled correctly when you call 'terraform import', so by @@ -209,12 +209,12 @@ // // Assume that block1 is: // -// provider "aws" { -// region = var.aws_region -// assume_role { -// role_arn = var.role_arn -// } -// } +// provider "aws" { +// region = var.aws_region +// assume_role { +// role_arn = var.role_arn +// } +// } // // If you call: // @@ -223,12 +223,12 @@ // // The result would be: // -// provider "aws" { -// region = "eu-west-1" -// assume_role { -// role_arn = "foo" -// } -// } +// provider "aws" { +// region = "eu-west-1" +// assume_role { +// role_arn = "foo" +// } +// } // // Assume block2 is: // @@ -239,7 +239,6 @@ // overrideAttributeInBlock(block2, "region", "eu-west-1") // overrideAttributeInBlock(block2, "assume_role.role_arn", "foo") // -// // The result would be: // // provider "aws" {} @@ -285,24 +284,28 @@ // // Assume block is: // -// provider "aws" { -// region = var.aws_region -// assume_role { -// role_arn = var.role_arn -// } -// } +// provider "aws" { +// region = var.aws_region +// assume_role { +// role_arn = var.role_arn +// } +// } // // traverseBlock(block, []string{"region"}) -// => returns (<body of the current block>, "region") +// +// => returns (<body of the current block>, "region") // // traverseBlock(block, []string{"assume_role", "role_arn"}) -// => returns (<body of the nested assume_role block>, "role_arn") +// +// => returns (<body of the nested assume_role block>, "role_arn") // // traverseBlock(block, []string{"foo"}) -// => returns (nil, "") +// +// => returns (nil, "") // // traverseBlock(block, []string{"assume_role", "foo"}) -// => returns (nil, "") +// +// => returns (nil, "") func traverseBlock(block *hclwrite.Block, keyParts []string) (*hclwrite.Body, string) { if block == nil { return nil, "" diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/config/include.go new/terragrunt-0.47.0/config/include.go --- old/terragrunt-0.46.3/config/include.go 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/config/include.go 2023-06-15 22:15:20.000000000 +0200 @@ -242,7 +242,8 @@ // attributes defined in the targetConfig. Note that this will modify the targetConfig. // NOTE: the following attributes are deliberately omitted from the merge operation, as they are handled differently in // the parser: -// - locals [These blocks are not merged by design] +// - locals [These blocks are not merged by design] +// // NOTE: dependencies block is a special case and is merged deeply. This is necessary to ensure the configstack system // works correctly, as it uses the `Dependencies` list to track the dependencies of modules for graph building purposes. // This list includes the dependencies added from dependency blocks, which is handled in a different stage. @@ -337,19 +338,19 @@ } // DeepMerge performs a deep merge of the given sourceConfig into the targetConfig. Deep merge is defined as follows: -// - For simple types, the source overrides the target. -// - For lists, the two attribute lists are combined together in concatenation. -// - For maps, the two maps are combined together recursively. That is, if the map keys overlap, then a deep merge is -// performed on the map value. -// - Note that some structs are not deep mergeable due to an implementation detail. This will change in the future. The -// following structs have this limitation: -// - remote_state -// - generate -// - Note that the following attributes are deliberately omitted from the merge operation, as they are handled -// differently in the parser: -// - dependency blocks (TerragruntDependencies) [These blocks need to retrieve outputs, so we need to merge during -// the parsing step, not after the full config is decoded] -// - locals [These blocks are not merged by design] +// - For simple types, the source overrides the target. +// - For lists, the two attribute lists are combined together in concatenation. +// - For maps, the two maps are combined together recursively. That is, if the map keys overlap, then a deep merge is +// performed on the map value. +// - Note that some structs are not deep mergeable due to an implementation detail. This will change in the future. The +// following structs have this limitation: +// - remote_state +// - generate +// - Note that the following attributes are deliberately omitted from the merge operation, as they are handled +// differently in the parser: +// - dependency blocks (TerragruntDependencies) [These blocks need to retrieve outputs, so we need to merge during +// the parsing step, not after the full config is decoded] +// - locals [These blocks are not merged by design] func (targetConfig *TerragruntConfig) DeepMerge(sourceConfig *TerragruntConfig, terragruntOptions *options.TerragruntOptions) error { // Merge simple attributes first if sourceConfig.DownloadDir != "" { @@ -738,37 +739,42 @@ // block: // // Case 1: a single include block as top level: -// { -// "include": { -// "path": "foo" -// } -// } +// +// { +// "include": { +// "path": "foo" +// } +// } // // Case 2: a single include block in list: -// { -// "include": [ -// {"path": "foo"} -// ] -// } +// +// { +// "include": [ +// {"path": "foo"} +// ] +// } // // Case 3: mixed bare and labeled include block as list: -// { -// "include": [ -// {"path": "foo"}, -// { -// "labeled": {"path": "bar"} -// } -// ] -// } +// +// { +// "include": [ +// {"path": "foo"}, +// { +// "labeled": {"path": "bar"} +// } +// ] +// } // // For simplicity of implementation, we focus on handling Case 1 and 2, and ignore Case 3. If we see Case 3, we will // error out. Instead, the user should handle this case explicitly using the object encoding instead of list encoding: -// { -// "include": { -// "": {"path": "foo"}, -// "labeled": {"path": "bar"} -// } -// } +// +// { +// "include": { +// "": {"path": "foo"}, +// "labeled": {"path": "bar"} +// } +// } +// // If the multiple include blocks are encoded in this way in the json configuration, nothing needs to be done by this // function. func updateBareIncludeBlockJSON(fileBytes []byte) ([]byte, bool, error) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/config/locals.go new/terragrunt-0.47.0/config/locals.go --- old/terragrunt-0.46.3/config/locals.go 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/config/locals.go 2023-06-15 22:15:20.000000000 +0200 @@ -36,9 +36,10 @@ // evaluateLocalsBlock is a routine to evaluate the locals block in a way to allow references to other locals. This // will: -// - Extract a reference to the locals block from the parsed file -// - Continuously evaluate the block until all references are evaluated, defering evaluation of anything that references -// other locals until those references are evaluated. +// - Extract a reference to the locals block from the parsed file +// - Continuously evaluate the block until all references are evaluated, defering evaluation of anything that references +// other locals until those references are evaluated. +// // This returns a map of the local names to the evaluated expressions (represented as `cty.Value` objects). This will // error if there are remaining unevaluated locals after all references that can be evaluated has been evaluated. func evaluateLocalsBlock( diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/configstack/running_module.go new/terragrunt-0.47.0/configstack/running_module.go --- old/terragrunt-0.46.3/configstack/running_module.go 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/configstack/running_module.go 2023-06-15 22:15:20.000000000 +0200 @@ -103,10 +103,10 @@ // Loop through the map of runningModules and for each module M: // -// * If dependencyOrder is NormalOrder, plug in all the modules M depends on into the Dependencies field and all the -// modules that depend on M into the NotifyWhenDone field. -// * If dependencyOrder is ReverseOrder, do the reverse. -// * If dependencyOrder is IgnoreOrder, do nothing. +// - If dependencyOrder is NormalOrder, plug in all the modules M depends on into the Dependencies field and all the +// modules that depend on M into the NotifyWhenDone field. +// - If dependencyOrder is ReverseOrder, do the reverse. +// - If dependencyOrder is IgnoreOrder, do nothing. func crossLinkDependencies(modules map[string]*runningModule, dependencyOrder DependencyOrder) (map[string]*runningModule, error) { for _, module := range modules { for _, dependency := range module.Module.Dependencies { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/go.mod new/terragrunt-0.47.0/go.mod --- old/terragrunt-0.46.3/go.mod 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/go.mod 2023-06-15 22:15:20.000000000 +0200 @@ -1,6 +1,6 @@ module github.com/gruntwork-io/terragrunt -go 1.18 +go 1.20 require ( cloud.google.com/go/storage v1.27.0 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/remote/remote_state_s3_test.go new/terragrunt-0.47.0/remote/remote_state_s3_test.go --- old/terragrunt-0.46.3/remote/remote_state_s3_test.go 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/remote/remote_state_s3_test.go 2023-06-15 22:15:20.000000000 +0200 @@ -351,7 +351,7 @@ } // Test to validate cases when is not possible to read all S3 configurations -//https://github.com/gruntwork-io/terragrunt/issues/2109 +// https://github.com/gruntwork-io/terragrunt/issues/2109 func TestNegativePublicAccessResponse(t *testing.T) { t.Parallel() testCases := []struct { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terragrunt-0.46.3/util/reflect.go new/terragrunt-0.47.0/util/reflect.go --- old/terragrunt-0.46.3/util/reflect.go 2023-06-07 21:09:12.000000000 +0200 +++ new/terragrunt-0.47.0/util/reflect.go 2023-06-15 22:15:20.000000000 +0200 @@ -15,22 +15,23 @@ } // MustWalkTerraformOutput is a helper utility to deeply return a value from a terraform output. -// nil will be returned if the path is invalid // -// Using an example terraform output: -// a = { -// b = { -// c = "foo" -// } -// "d" = [ -// 1, -// 2 -// ] -// } +// nil will be returned if the path is invalid // -// path ["a", "b", "c"] will return "foo" -// path ["a", "d", "1"] will return 2 -// path ["a", "foo"] will return nil +// Using an example terraform output: +// a = { +// b = { +// c = "foo" +// } +// "d" = [ +// 1, +// 2 +// ] +// } +// +// path ["a", "b", "c"] will return "foo" +// path ["a", "d", "1"] will return 2 +// path ["a", "foo"] will return nil func MustWalkTerraformOutput(value interface{}, path ...string) interface{} { if value == nil { return nil ++++++ terragrunt.obsinfo ++++++ --- /var/tmp/diff_new_pack.5PwAGd/_old 2023-06-16 16:56:36.622332590 +0200 +++ /var/tmp/diff_new_pack.5PwAGd/_new 2023-06-16 16:56:36.626332613 +0200 @@ -1,5 +1,5 @@ name: terragrunt -version: 0.46.3 -mtime: 1686164952 -commit: d59c964f36a32f2b73217e6306b07056cd473054 +version: 0.47.0 +mtime: 1686860120 +commit: 1d181090e511602cf5462f845bc854f540bc9f14 ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/terragrunt/vendor.tar.gz /work/SRC/openSUSE:Factory/.terragrunt.new.15902/vendor.tar.gz differ: char 5, line 1