cds-snc / saas-procurement

Repo for the Saas Procurement app
MIT License
1 stars 0 forks source link

chore(deps): update aws-actions/configure-aws-credentials action to v4 - autoclosed #344

Closed renovate[bot] closed 7 months ago

renovate[bot] commented 9 months ago

Mend Renovate

This PR contains the following updates:

Package Type Update Change
aws-actions/configure-aws-credentials action major v1.7.0 -> v4.0.2
aws-actions/configure-aws-credentials action major v2.2.0 -> v4.0.2

Review


Release Notes

aws-actions/configure-aws-credentials (aws-actions/configure-aws-credentials) ### [`v4.0.2`](https://togithub.com/aws-actions/configure-aws-credentials/compare/v4.0.1...v4.0.2) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v4.0.1...v4.0.2) ### [`v4.0.1`](https://togithub.com/aws-actions/configure-aws-credentials/releases/tag/v4.0.1) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v4.0.0...v4.0.1) See the [changelog](https://togithub.com/aws-actions/configure-aws-credentials/blob/main/CHANGELOG.md) for details about the changes included in this release. ### [`v4.0.0`](https://togithub.com/aws-actions/configure-aws-credentials/releases/tag/v4.0.0) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v3.0.2...v4.0.0) See the [changelog](https://togithub.com/aws-actions/configure-aws-credentials/blob/v4.0.0/CHANGELOG.md) for details about the changes included in this release. ### [`v3.0.2`](https://togithub.com/aws-actions/configure-aws-credentials/releases/tag/v3.0.2) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v3.0.1...v3.0.2) See the [changelog](https://togithub.com/aws-actions/configure-aws-credentials/blob/v3.0.2/CHANGELOG.md) for details about the changes included in this release. ### [`v3.0.1`](https://togithub.com/aws-actions/configure-aws-credentials/releases/tag/v3.0.1) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v3.0.0...v3.0.1) See the [changelog](https://togithub.com/aws-actions/configure-aws-credentials/blob/v3.0.1/CHANGELOG.md) for details about the changes included in this release. ### [`v3.0.0`](https://togithub.com/aws-actions/configure-aws-credentials/releases/tag/v3.0.0) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v2.2.0...v3.0.0) See the [changelog](https://togithub.com/aws-actions/configure-aws-credentials/blob/v3.0.0/CHANGELOG.md) for details about the changes included in this release. ### [`v2.2.0`](https://togithub.com/aws-actions/configure-aws-credentials/releases/tag/v2.2.0) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v2.1.0...v2.2.0) See the [changelog](https://togithub.com/aws-actions/configure-aws-credentials/blob/v2.2.0/CHANGELOG.md) for details about the changes included in this release. ### [`v2.1.0`](https://togithub.com/aws-actions/configure-aws-credentials/releases/tag/v2.1.0) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v2.0.0...v2.1.0) See the [changelog](https://togithub.com/aws-actions/configure-aws-credentials/blob/v2.1.0/CHANGELOG.md) for details about the changes included in this release. ### [`v2.0.0`](https://togithub.com/aws-actions/configure-aws-credentials/releases/tag/v2.0.0) [Compare Source](https://togithub.com/aws-actions/configure-aws-credentials/compare/v1.7.0...v2.0.0) See the [changelog](https://togithub.com/aws-actions/configure-aws-credentials/blob/v2.0.0/CHANGELOG.md) for details about the changes included in this release.

Configuration

πŸ“… Schedule: Branch creation - "every weekend" in timezone America/Montreal, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

β™» Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

πŸ”• Ignore: Close this PR and you won't be reminded about these updates again.



This PR has been generated by Mend Renovate. View repository job log here.

github-actions[bot] commented 7 months ago

Staging: ssm

βœ…   Terraform Init: success βœ…   Terraform Validate: success βœ…   Terraform Format: success βœ…   Terraform Plan: success βœ…   Conftest: success

Plan: 0 to add, 1 to change, 0 to destroy
Show summary | CHANGE | NAME | |--------|-------------------------------------| | update | `aws_ssm_parameter.saas_app_config` |
Show plan ```terraform Resource actions are indicated with the following symbols: ~ update in-place Terraform will perform the following actions: # aws_ssm_parameter.saas_app_config will be updated in-place ~ resource "aws_ssm_parameter" "saas_app_config" { id = "saas_app_config" + insecure_value = (known after apply) name = "saas_app_config" tags = { "CostCentre" = "saas-procurement" "Terraform" = "true" } ~ value = (sensitive value) ~ version = 15 -> (known after apply) # (6 unchanged attributes hidden) } Plan: 0 to add, 1 to change, 0 to destroy. Changes to Outputs: - saas_app_config_value = (sensitive value) -> null ───────────────────────────────────────────────────────────────────────────── Saved the plan to: plan.tfplan To perform exactly these actions, run the following command to apply: terraform apply "plan.tfplan" ```
Show Conftest results ```sh 20 tests, 20 passed, 0 warnings, 0 failures, 0 exceptions ```
github-actions[bot] commented 7 months ago

Staging: rds

βœ…   Terraform Init: success βœ…   Terraform Validate: success βœ…   Terraform Format: success ❌   Terraform Plan: failed ❌   Conftest: failed

Show plan ```terraform Error: Error acquiring the state lock Error message: operation error DynamoDB: PutItem, https response error StatusCode: 400, RequestID: 399KJE3CKMVISFMI0B23QJCSCJVV4KQNSO5AEMVJF66Q9ASUAAJG, ConditionalCheckFailedException: The conditional request failed Lock Info: ID: 0d283af0-aa62-2d89-1e8e-ffa272310d10 Path: saas-procurement-tf/staging/rds/terraform.tfstate Operation: OperationTypePlan Who: runner@fv-az575-627 Version: 1.6.2 Created: 2024-02-09 21:29:25.912423265 +0000 UTC Info: Terraform acquires a state lock to protect the state from being written by multiple users at the same time. Please resolve the issue above and try again. For most commands, you can disable locking with the "-lock=false" flag, but this is not recommended. time=2024-02-09T21:29:28Z level=error msg=terraform invocation failed in /home/runner/work/saas-procurement/saas-procurement/terragrunt/env/staging/rds/.terragrunt-cache/PoOcl3EB66S-TSlaOe46JFgc03I/mxs7sI9KzE7bKKyXCf4RE8fGArk/rds prefix=[/home/runner/work/saas-procurement/saas-procurement/terragrunt/env/staging/rds] time=2024-02-09T21:29:28Z level=error msg=1 error occurred: * [/home/runner/work/saas-procurement/saas-procurement/terragrunt/env/staging/rds/.terragrunt-cache/PoOcl3EB66S-TSlaOe46JFgc03I/mxs7sI9KzE7bKKyXCf4RE8fGArk/rds] exit status 1 ```
github-actions[bot] commented 7 months ago

Staging: ecs

βœ…   Terraform Init: success βœ…   Terraform Validate: success βœ…   Terraform Format: success βœ…   Terraform Plan: success βœ…   Conftest: success

⚠️   Warning: resources will be destroyed by this change!

Plan: 0 to add, 1 to change, 1 to destroy
Show summary | CHANGE | NAME | |--------|------------------------------------| | delete | `aws_ecs_cluster.saas_procurement` | | update | `aws_security_group.ecs_tasks` |
Show plan ```terraform Resource actions are indicated with the following symbols: ~ update in-place - destroy Terraform will perform the following actions: # aws_ecs_cluster.saas_procurement will be destroyed # (because aws_ecs_cluster.saas_procurement is not in configuration) - resource "aws_ecs_cluster" "saas_procurement" { - arn = "arn:aws:ecs:ca-central-1:394954348146:cluster/saas-procurement-cluster" -> null - capacity_providers = [ - "FARGATE", ] -> null - id = "arn:aws:ecs:ca-central-1:394954348146:cluster/saas-procurement-cluster" -> null - name = "saas-procurement-cluster" -> null - tags = { - "CostCentre" = "saas-procurement" - "Terraform" = "true" } -> null - tags_all = { - "CostCentre" = "saas-procurement" - "Terraform" = "true" } -> null - default_capacity_provider_strategy { - base = 1 -> null - capacity_provider = "FARGATE" -> null - weight = 1 -> null } - setting { - name = "containerInsights" -> null - value = "enabled" -> null } } # aws_security_group.ecs_tasks will be updated in-place ~ resource "aws_security_group" "ecs_tasks" { ~ egress = [ - { - cidr_blocks = [] - description = "Allow ECS to talk to the RDS cluster" - from_port = 5432 - ipv6_cidr_blocks = [] - prefix_list_ids = [] - protocol = "tcp" - security_groups = [ - "sg-051638cd60aef88c3", ] - self = false - to_port = 5432 }, # (1 unchanged element hidden) ] id = "sg-0d1ca7e7e561a219f" name = "saas-procurement-security-group" tags = { "CostCentre" = "saas-procurement" } # (7 unchanged attributes hidden) } Plan: 0 to add, 1 to change, 1 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: plan.tfplan To perform exactly these actions, run the following command to apply: terraform apply "plan.tfplan" ```
Show Conftest results ```sh WARN - plan.json - main - Missing Common Tags: ["aws_security_group.ecs_tasks"] WARN - plan.json - main - Missing Common Tags: ["module.saas_procurement.module.sentinel_forwarder[0].aws_cloudwatch_log_group.sentinel_forwarder_lambda"] WARN - plan.json - main - Missing Common Tags: ["module.saas_procurement.module.sentinel_forwarder[0].aws_iam_policy.sentinel_forwarder_lambda"] WARN - plan.json - main - Missing Common Tags: ["module.saas_procurement.module.sentinel_forwarder[0].aws_iam_role.sentinel_forwarder_lambda"] WARN - plan.json - main - Missing Common Tags: ["module.saas_procurement.module.sentinel_forwarder[0].aws_lambda_function.sentinel_forwarder"] 24 tests, 19 passed, 5 warnings, 0 failures, 0 exceptions ```