Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update all non-major github action dependencies #907

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Nov 30, 2024

This PR contains the following updates:

Package Type Update Change Pending
actions/create-github-app-token action patch v1.11.0 -> v1.11.3 v1.11.5 (+1)
actions/setup-node action minor v4.1.0 -> v4.2.0
aws-actions/amazon-ecs-deploy-task-definition action minor v2.1.2 -> v2.3.0
aws-actions/amazon-ecs-render-task-definition action patch v1.6.0 -> v1.6.2
aws-actions/configure-aws-credentials action patch v4.0.2 -> v4.0.3 v4.1.0
cds-snc/terraform-plan action patch v3.3.0 -> v3.3.1

Review

  • Updates have been tested and work
  • If updates are AWS related, versions match the infrastructure (e.g. Lambda runtime, database, etc.)

Release Notes

actions/create-github-app-token (actions/create-github-app-token)

v1.11.3

Compare Source

Bug Fixes

v1.11.2

Compare Source

Bug Fixes

v1.11.1

Compare Source

What's Changed

Bug Fixes

Full Changelog: actions/create-github-app-token@v1.11.0...v1.11.1

actions/setup-node (actions/setup-node)

v4.2.0

Compare Source

aws-actions/amazon-ecs-deploy-task-definition (aws-actions/amazon-ecs-deploy-task-definition)

v2.3.0

Compare Source

See the changelog for details about the changes included in this release.

v2.2.0

Compare Source

See the changelog for details about the changes included in this release.

aws-actions/amazon-ecs-render-task-definition (aws-actions/amazon-ecs-render-task-definition)

v1.6.2

Compare Source

See the changelog for details about the changes included in this release.

v1.6.1

Compare Source

See the changelog for details about the changes included in this release.

aws-actions/configure-aws-credentials (aws-actions/configure-aws-credentials)

v4.0.3

Compare Source

Features
  • added release-please action config (0f88004)
Bug Fixes
Miscellaneous Chores
cds-snc/terraform-plan (cds-snc/terraform-plan)

v3.3.1

Compare Source

What's Changed
New Contributors

Full Changelog: cds-snc/terraform-plan@v3...v3.3.1


Configuration

📅 Schedule: Branch creation - "every weekend" in timezone America/Montreal, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch 4 times, most recently from 3a898e4 to 98ad3e9 Compare December 3, 2024 16:18
@renovate renovate bot changed the title chore(deps): update cds-snc/terraform-plan action to v3.3.1 chore(deps): update all non-major github action dependencies Dec 3, 2024
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch 10 times, most recently from 2b1188c to 978cb5a Compare December 10, 2024 14:08
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch 4 times, most recently from 9089d26 to 1f028cd Compare December 13, 2024 16:19
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch from 1f028cd to b78e2f6 Compare December 18, 2024 20:02
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch from b78e2f6 to b329bdb Compare December 27, 2024 18:52
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch 3 times, most recently from abd89a7 to 19ffb9c Compare January 9, 2025 19:20
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch 4 times, most recently from 42c69d8 to e764a32 Compare January 21, 2025 14:46
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch 4 times, most recently from b5f1d64 to 97d0be3 Compare February 3, 2025 22:34
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch 14 times, most recently from c54c18f to b12798b Compare February 11, 2025 16:30
@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch 8 times, most recently from d008dce to e050d92 Compare February 13, 2025 13:53
Copy link

Staging: load_testing

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 4 to change, 0 to destroy
Show summary
CHANGE NAME
update aws_iam_policy.load_test_lambda
aws_ssm_parameter.load_testing_form_id
aws_ssm_parameter.load_testing_form_private_key
aws_ssm_parameter.load_testing_zitadel_app_private_key
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place
 <= read (data resources)

Terraform will perform the following actions:

  # data.aws_iam_policy_document.load_test_lambda will be read during apply
  # (depends on a resource or a module with changes pending)
 <= data "aws_iam_policy_document" "load_test_lambda" {
      + id            = (known after apply)
      + json          = (known after apply)
      + minified_json = (known after apply)

      + statement {
          + actions   = [
              + "ssm:GetParameters",
            ]
          + effect    = "Allow"
          + resources = [
              + "arn:aws:ssm:ca-central-1:687401027353:parameter/load-testing/form-id",
              + "arn:aws:ssm:ca-central-1:687401027353:parameter/load-testing/form-private-key",
              + "arn:aws:ssm:ca-central-1:687401027353:parameter/load-testing/zitadel-app-private-key",
            ]
          + sid       = "GetSSMParameters"
        }
      + statement {
          + actions   = [
              + "lambda:InvokeFunction",
            ]
          + effect    = "Allow"
          + resources = [
              + "arn:aws:lambda:ca-central-1:687401027353:function:Submission",
            ]
          + sid       = "InvokeSubmissionLambda"
        }
    }

  # aws_iam_policy.load_test_lambda will be updated in-place
  ~ resource "aws_iam_policy" "load_test_lambda" {
        id               = "arn:aws:iam::687401027353:policy/LoadTestLambda"
        name             = "LoadTestLambda"
      ~ policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = "ssm:GetParameters"
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:ssm:ca-central-1:687401027353:parameter/load-testing/zitadel-app-private-key",
                          - "arn:aws:ssm:ca-central-1:687401027353:parameter/load-testing/form-private-key",
                          - "arn:aws:ssm:ca-central-1:687401027353:parameter/load-testing/form-id",
                        ]
                      - Sid      = "GetSSMParameters"
                    },
                  - {
                      - Action   = "lambda:InvokeFunction"
                      - Effect   = "Allow"
                      - Resource = "arn:aws:lambda:ca-central-1:687401027353:function:Submission"
                      - Sid      = "InvokeSubmissionLambda"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> (known after apply)
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_ssm_parameter.load_testing_form_id will be updated in-place
  ~ resource "aws_ssm_parameter" "load_testing_form_id" {
        id              = "/load-testing/form-id"
      + insecure_value  = (known after apply)
        name            = "/load-testing/form-id"
        tags            = {}
      ~ version         = 1 -> (known after apply)
        # (9 unchanged attributes hidden)
    }

  # aws_ssm_parameter.load_testing_form_private_key will be updated in-place
  ~ resource "aws_ssm_parameter" "load_testing_form_private_key" {
        id              = "/load-testing/form-private-key"
      + insecure_value  = (known after apply)
        name            = "/load-testing/form-private-key"
        tags            = {}
      ~ version         = 3 -> (known after apply)
        # (9 unchanged attributes hidden)
    }

  # aws_ssm_parameter.load_testing_zitadel_app_private_key will be updated in-place
  ~ resource "aws_ssm_parameter" "load_testing_zitadel_app_private_key" {
        id              = "/load-testing/zitadel-app-private-key"
      + insecure_value  = (known after apply)
        name            = "/load-testing/zitadel-app-private-key"
        tags            = {}
      ~ version         = 3 -> (known after apply)
        # (9 unchanged attributes hidden)
    }

Plan: 0 to add, 4 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.load_test_lambda"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_role.load_test_lambda"]
WARN - plan.json - main - Missing Common Tags: ["aws_lambda_function.load_testing"]
WARN - plan.json - main - Missing Common Tags: ["aws_ssm_parameter.load_testing_form_id"]
WARN - plan.json - main - Missing Common Tags: ["aws_ssm_parameter.load_testing_form_private_key"]
WARN - plan.json - main - Missing Common Tags: ["aws_ssm_parameter.load_testing_zitadel_app_private_key"]

25 tests, 19 passed, 6 warnings, 0 failures, 0 exceptions

@renovate renovate bot force-pushed the renovate/all-non-major-github-action branch from e050d92 to a3b998b Compare February 13, 2025 21:09
Copy link

Staging: idp

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
❌   Terraform Plan: failed
❌   Conftest: failed

Show plan
Error: Error acquiring the state lock

Error message: operation error DynamoDB: PutItem, https response error
StatusCode: 400, RequestID:
BO5MJQ6156NTD66FPHENV6MLR7VV4KQNSO5AEMVJF66Q9ASUAAJG,
ConditionalCheckFailedException: The conditional request failed
Lock Info:
  ID:        2259d8d2-c0c1-1793-917c-ae9cb8f9f225
  Path:      forms-staging-tfstate/cloud/idp/terraform.tfstate
  Operation: OperationTypePlan
  Who:       runner@fv-az1927-276
  Version:   1.10.5
  Created:   2025-02-13 21:16:31.300158117 +0000 UTC
  Info:      


Terraform acquires a state lock to protect the state from being written
by multiple users at the same time. Please resolve the issue above and try
again. For most commands, you can disable locking with the "-lock=false"
flag, but this is not recommended.
�[0;90m21:16:39.689�[0m �[0;31mERROR �[0m terraform invocation failed in ./.terragrunt-cache/nw1mzhxzw5xGGU9B1H6NoYmf6j4/-syjFrdAaB-6kNXhMmF1nXBOp7o/idp
�[0;90m21:16:39.689�[0m �[0;31mERROR �[0m error occurred:

* Failed to execute "terraform plan -no-color -input=false -out=plan.tfplan" in ./.terragrunt-cache/nw1mzhxzw5xGGU9B1H6NoYmf6j4/-syjFrdAaB-6kNXhMmF1nXBOp7o/idp
  
  Error: Error acquiring the state lock
  
  Error message: operation error DynamoDB: PutItem, https response error
  StatusCode: 400, RequestID:
  BO5MJQ6156NTD66FPHENV6MLR7VV4KQNSO5AEMVJF66Q9ASUAAJG,
  ConditionalCheckFailedException: The conditional request failed
  Lock Info:
    ID:        2259d8d2-c0c1-1793-917c-ae9cb8f9f225
    Path:      forms-staging-tfstate/cloud/idp/terraform.tfstate
    Operation: OperationTypePlan
    Who:       runner@fv-az1927-276
    Version:   1.10.5
    Created:   2025-02-13 21:16:31.300158117 +0000 UTC
    Info:      
  
  
  Terraform acquires a state lock to protect the state from being written
  by multiple users at the same time. Please resolve the issue above and try
  again. For most commands, you can disable locking with the "-lock=false"
  flag, but this is not recommended.
  
  exit status 1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants