chore(deps): update public.ecr.aws/lambda/python docker tag to v3.9.2024.04.17.17 #73
Travis CI / Travis CI - Branch
succeeded
May 13, 2024 in 6m 10s
Build Passed
The build passed, just like the previous build.
Details
This is a normal build for the renovate/public.ecr.aws-lambda-python-3.x branch. You should be able to reproduce it by checking out the branch locally.
Jobs and Stages
This build has three jobs, running in three sequential stages.
Stage 1: validate-cfn-templates
This stage passed.
Job | ENV | OS | State |
---|---|---|---|
720.1 Validate CloudFormation Templates | AWS_ACCESS_KEY_ID=[secure] | Linux | passed |
Stage 2: unit_tests
This stage passed.
Job | ENV | OS | State |
---|---|---|---|
720.2 Unit Tests | AWS_ACCESS_KEY_ID=[secure] | Linux | passed |
Stage 3: build
This stage passed.
Job | ENV | OS | State |
---|---|---|---|
720.3 Build | AWS_ACCESS_KEY_ID=[secure] | Linux | passed |
Build Configuration
Build Option | Setting |
---|---|
Language | Shell |
Operating System | Linux (Jammy) |
Build Configuration
{
"language": "shell",
"os": [
"linux"
],
"dist": "jammy",
"addons": {
"apt": {
"sources": [
{
"sourceline": "deb https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable"
}
],
"packages": [
"docker-buildx-plugin"
]
}
},
"if": "fork = false",
"notifications": {
"email": [
{
"recipients": [
{
"secure": "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"
}
],
"on_success": "never",
"on_failure": "always"
}
],
"slack": [
{
"rooms": [
{
"secure": "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"
}
]
}
]
},
"env": [
"global=AWS_ACCESS_KEY_ID=[secure]=AWS_SECRET_ACCESS_KEY=[secure]=AWS_DEFAULT_REGION=[secure]=ECR_REPOSITORY_URL=[secure]"
],
"before_install": [
"# before_install: Install AWS CLI and download Lambda Layers\n# Get CPU architecture\n\nif [[ $TRAVIS_CPU_ARCH == \"amd64\" ]]; then export LAMBDA_ARCH=x86_64; export AWSCLI_ARCH=x86_64; elif [[ ${TRAVIS_CPU_ARCH:0:5} == \"arm64\" ]]; then export LAMBDA_ARCH=arm64; export AWSCLI_ARCH=aarch64; fi\n\n# install yq and AWS CLI\n./scripts/install_tools.sh\n\n# Get dependent lambda layers\nbash get-required-lambda-layers.sh\n\n# Define env vars\nexport COMMIT=${TRAVIS_COMMIT:0:7}\nexport STACK_NAME=e2e-dt-aws-s3-log-forwarder-${TRAVIS_BUILD_ID}\nexport E2E_TESTING_BUCKET_NAME=dynatrace-aws-s3-log-forwarder-e2e-testing\n\n# CloudFormation Mappings don't support \"_\" in names, so we need to match mapping name x86\nexport MAPPING=$(if [[ $LAMBDA_ARCH == \"x86_64\" ]];then echo \"x86\"; else echo $LAMBDA_ARCH; fi )\nexport LAMBDA_BASE_IMAGE_TAG=$(cat template.yaml | yq \".Mappings.LambdaBaseImageMap.${MAPPING}.Tag\")\n"
],
"jobs": {
"include": [
{
"stage": "validate-cfn-templates",
"name": "Validate CloudFormation Templates",
"script": [
"aws cloudformation validate-template --template-body file://template.yaml",
"aws cloudformation validate-template --template-body file://dynatrace-aws-s3-log-forwarder-configuration.yaml",
"aws cloudformation validate-template --template-body file://dynatrace-aws-s3-log-forwarder-s3-bucket-configuration.yaml",
"aws cloudformation validate-template --template-body file://eventbridge-cross-region-or-account-forward-rules.yaml"
]
},
{
"stage": "unit_tests",
"name": "Unit Tests",
"services": [
"docker"
],
"script": [
"docker build --progress=plain -t queueprocessingfunction:test --build-arg ARCH=$LAMBDA_ARCH \\\n --build-arg LAMBDA_BASE_IMAGE_TAG=${LAMBDA_BASE_IMAGE_TAG} --build-arg ENABLE_LAMBDA_INSIGHTS=\"false\" --build-arg ENV=\"DEV\" .\n",
"docker run --entrypoint=\"\" --mount type=bind,source=${TRAVIS_BUILD_DIR}/tests,target=/var/task/tests --env-file=tests/unit/unit_test.env \\\n queueprocessingfunction:test python -m unittest discover -s tests -b\n"
]
},
{
"stage": "build",
"name": "Build",
"script": [
"./scripts/update_version.sh",
"docker build -t dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH} . --build-arg ARCH=$LAMBDA_ARCH \\\n --build-arg ENABLE_LAMBDA_INSIGHTS=\"false\" --build-arg LAMBDA_BASE_IMAGE_TAG=${LAMBDA_BASE_IMAGE_TAG}\n",
"aws ecr get-login-password --region us-east-1 | docker login --username AWS --password-stdin $ECR_REPOSITORY_URL",
"docker tag dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH} ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH}",
"docker push ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH}"
]
},
{
"stage": "end-to-end-test",
"name": "End-to-end deployment test",
"if": "fork = false AND ( branch == main OR type == pull_request )",
"install": [
"pip install argparse requests"
],
"script": [
"./tests/e2e/deploy_forwarder_for_validation.sh",
"echo \"[$(date -u '+%Y-%m-%dT%H:%M:%SZ')] E2E testing validation log entry\" > ${TRAVIS_BUILD_ID}.log\naws s3 cp ${TRAVIS_BUILD_ID}.log s3://${E2E_TESTING_BUCKET_NAME}/test/${TRAVIS_BUILD_ID}/validation/test_log.log\nsleep 120\n",
"./tests/e2e/validate_logs_exist.py --bucket ${E2E_TESTING_BUCKET_NAME} --key test/${TRAVIS_BUILD_ID}/validation/test_log.log"
],
"after_script": [
"./tests/e2e/clean_up_resources.sh"
]
},
{
"stage": "release-container-image",
"name": "Release Container Image",
"if": "tag =~ /^v.*$/",
"env": [
{
"secure": "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"
}
],
"script": [
"aws ecr get-login-password --region us-east-1 | docker login --username AWS --password-stdin $ECR_REPOSITORY_URL",
"echo $DOCKER_HUB_TOKEN | docker login --username dts3logforwarderuser --password-stdin docker.io",
"aws ecr-public get-login-password --region us-east-1 | docker login --username AWS --password-stdin public.ecr.aws/dynatrace-oss",
"docker pull ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH}",
"docker tag ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH} dynatrace/dynatrace-aws-s3-log-forwarder:${TRAVIS_TAG}-${LAMBDA_ARCH}",
"docker push dynatrace/dynatrace-aws-s3-log-forwarder:${TRAVIS_TAG}-${LAMBDA_ARCH}",
"docker tag ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH} public.ecr.aws/dynatrace-oss/dynatrace-aws-s3-log-forwarder:${TRAVIS_TAG}-${LAMBDA_ARCH}",
"docker push public.ecr.aws/dynatrace-oss/dynatrace-aws-s3-log-forwarder:${TRAVIS_TAG}-${LAMBDA_ARCH}",
"./scripts/update_version.sh",
"aws s3 cp template.yaml s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/",
"aws s3 cp dynatrace-aws-s3-log-forwarder-configuration.yaml s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/",
"aws s3 cp dynatrace-aws-s3-log-forwarder-s3-bucket-configuration.yaml s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/",
"aws s3 cp eventbridge-cross-region-or-account-forward-rules.yaml s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/",
"zip templates.zip template.yaml dynatrace-aws-s3-log-forwarder-configuration.yaml dynatrace-aws-s3-log-forwarder-s3-bucket-configuration.yaml eventbridge-cross-region-or-account-forward-rules.yaml",
"aws s3 cp templates.zip s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/"
]
}
]
}
}
Loading