Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update public.ecr.aws/lambda/python docker tag to v3.9.2024.04.17.17 #73

Merged
merged 1 commit into from
May 13, 2024

chore(deps): update public.ecr.aws/lambda/python docker tag to v3.9.2…

5a886df
Select commit
Loading
Failed to load commit list.
Merged

chore(deps): update public.ecr.aws/lambda/python docker tag to v3.9.2024.04.17.17 #73

chore(deps): update public.ecr.aws/lambda/python docker tag to v3.9.2…
5a886df
Select commit
Loading
Failed to load commit list.
Travis CI / Travis CI - Branch succeeded May 13, 2024 in 6m 10s

Build Passed

The build passed, just like the previous build.

Details

This is a normal build for the renovate/public.ecr.aws-lambda-python-3.x branch. You should be able to reproduce it by checking out the branch locally.

Jobs and Stages

This build has three jobs, running in three sequential stages.

Stage 1: validate-cfn-templates

This stage passed.

Job ENV OS State
720.1 Validate CloudFormation Templates AWS_ACCESS_KEY_ID=[secure] Linux passed

Stage 2: unit_tests

This stage passed.

Job ENV OS State
720.2 Unit Tests AWS_ACCESS_KEY_ID=[secure] Linux passed

Stage 3: build

This stage passed.

Job ENV OS State
720.3 Build AWS_ACCESS_KEY_ID=[secure] Linux passed

Build Configuration

Build Option Setting
Language Shell
Operating System Linux (Jammy)
Build Configuration
{
  "language": "shell",
  "os": [
    "linux"
  ],
  "dist": "jammy",
  "addons": {
    "apt": {
      "sources": [
        {
          "sourceline": "deb https://download.docker.com/linux/ubuntu $(lsb_release -cs) stable"
        }
      ],
      "packages": [
        "docker-buildx-plugin"
      ]
    }
  },
  "if": "fork = false",
  "notifications": {
    "email": [
      {
        "recipients": [
          {
            "secure": "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"
          }
        ],
        "on_success": "never",
        "on_failure": "always"
      }
    ],
    "slack": [
      {
        "rooms": [
          {
            "secure": "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"
          }
        ]
      }
    ]
  },
  "env": [
    "global=AWS_ACCESS_KEY_ID=[secure]=AWS_SECRET_ACCESS_KEY=[secure]=AWS_DEFAULT_REGION=[secure]=ECR_REPOSITORY_URL=[secure]"
  ],
  "before_install": [
    "# before_install: Install AWS CLI and download Lambda Layers\n# Get CPU architecture\n\nif [[ $TRAVIS_CPU_ARCH == \"amd64\" ]]; then export LAMBDA_ARCH=x86_64; export AWSCLI_ARCH=x86_64; elif [[ ${TRAVIS_CPU_ARCH:0:5} == \"arm64\" ]]; then export LAMBDA_ARCH=arm64; export AWSCLI_ARCH=aarch64; fi\n\n# install yq and AWS CLI\n./scripts/install_tools.sh\n\n# Get dependent lambda layers\nbash get-required-lambda-layers.sh\n\n# Define env vars\nexport COMMIT=${TRAVIS_COMMIT:0:7}\nexport STACK_NAME=e2e-dt-aws-s3-log-forwarder-${TRAVIS_BUILD_ID}\nexport E2E_TESTING_BUCKET_NAME=dynatrace-aws-s3-log-forwarder-e2e-testing\n\n# CloudFormation Mappings don't support \"_\" in names, so we need to match mapping name x86\nexport MAPPING=$(if [[ $LAMBDA_ARCH == \"x86_64\" ]];then echo \"x86\"; else echo $LAMBDA_ARCH; fi )\nexport LAMBDA_BASE_IMAGE_TAG=$(cat template.yaml | yq \".Mappings.LambdaBaseImageMap.${MAPPING}.Tag\")\n"
  ],
  "jobs": {
    "include": [
      {
        "stage": "validate-cfn-templates",
        "name": "Validate CloudFormation Templates",
        "script": [
          "aws cloudformation validate-template --template-body file://template.yaml",
          "aws cloudformation validate-template --template-body file://dynatrace-aws-s3-log-forwarder-configuration.yaml",
          "aws cloudformation validate-template --template-body file://dynatrace-aws-s3-log-forwarder-s3-bucket-configuration.yaml",
          "aws cloudformation validate-template --template-body file://eventbridge-cross-region-or-account-forward-rules.yaml"
        ]
      },
      {
        "stage": "unit_tests",
        "name": "Unit Tests",
        "services": [
          "docker"
        ],
        "script": [
          "docker build --progress=plain -t queueprocessingfunction:test --build-arg ARCH=$LAMBDA_ARCH  \\\n  --build-arg LAMBDA_BASE_IMAGE_TAG=${LAMBDA_BASE_IMAGE_TAG} --build-arg ENABLE_LAMBDA_INSIGHTS=\"false\" --build-arg ENV=\"DEV\" .\n",
          "docker run --entrypoint=\"\" --mount type=bind,source=${TRAVIS_BUILD_DIR}/tests,target=/var/task/tests --env-file=tests/unit/unit_test.env \\\n  queueprocessingfunction:test python -m unittest discover -s tests -b\n"
        ]
      },
      {
        "stage": "build",
        "name": "Build",
        "script": [
          "./scripts/update_version.sh",
          "docker build -t dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH} . --build-arg ARCH=$LAMBDA_ARCH \\\n             --build-arg ENABLE_LAMBDA_INSIGHTS=\"false\" --build-arg LAMBDA_BASE_IMAGE_TAG=${LAMBDA_BASE_IMAGE_TAG}\n",
          "aws ecr get-login-password --region us-east-1 | docker login --username AWS --password-stdin $ECR_REPOSITORY_URL",
          "docker tag dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH} ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH}",
          "docker push ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH}"
        ]
      },
      {
        "stage": "end-to-end-test",
        "name": "End-to-end deployment test",
        "if": "fork = false AND ( branch == main OR type == pull_request )",
        "install": [
          "pip install argparse requests"
        ],
        "script": [
          "./tests/e2e/deploy_forwarder_for_validation.sh",
          "echo \"[$(date -u '+%Y-%m-%dT%H:%M:%SZ')] E2E testing validation log entry\" > ${TRAVIS_BUILD_ID}.log\naws s3 cp ${TRAVIS_BUILD_ID}.log s3://${E2E_TESTING_BUCKET_NAME}/test/${TRAVIS_BUILD_ID}/validation/test_log.log\nsleep 120\n",
          "./tests/e2e/validate_logs_exist.py --bucket ${E2E_TESTING_BUCKET_NAME} --key test/${TRAVIS_BUILD_ID}/validation/test_log.log"
        ],
        "after_script": [
          "./tests/e2e/clean_up_resources.sh"
        ]
      },
      {
        "stage": "release-container-image",
        "name": "Release Container Image",
        "if": "tag =~ /^v.*$/",
        "env": [
          {
            "secure": "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"
          }
        ],
        "script": [
          "aws ecr get-login-password --region us-east-1 | docker login --username AWS --password-stdin $ECR_REPOSITORY_URL",
          "echo $DOCKER_HUB_TOKEN | docker login --username dts3logforwarderuser --password-stdin docker.io",
          "aws ecr-public get-login-password --region us-east-1 | docker login --username AWS --password-stdin public.ecr.aws/dynatrace-oss",
          "docker pull ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH}",
          "docker tag ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH} dynatrace/dynatrace-aws-s3-log-forwarder:${TRAVIS_TAG}-${LAMBDA_ARCH}",
          "docker push dynatrace/dynatrace-aws-s3-log-forwarder:${TRAVIS_TAG}-${LAMBDA_ARCH}",
          "docker tag ${ECR_REPOSITORY_URL}/dynatrace-aws-s3-log-forwarder:${COMMIT}-${LAMBDA_ARCH} public.ecr.aws/dynatrace-oss/dynatrace-aws-s3-log-forwarder:${TRAVIS_TAG}-${LAMBDA_ARCH}",
          "docker push public.ecr.aws/dynatrace-oss/dynatrace-aws-s3-log-forwarder:${TRAVIS_TAG}-${LAMBDA_ARCH}",
          "./scripts/update_version.sh",
          "aws s3 cp template.yaml s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/",
          "aws s3 cp dynatrace-aws-s3-log-forwarder-configuration.yaml s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/",
          "aws s3 cp dynatrace-aws-s3-log-forwarder-s3-bucket-configuration.yaml s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/",
          "aws s3 cp eventbridge-cross-region-or-account-forward-rules.yaml s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/",
          "zip templates.zip template.yaml dynatrace-aws-s3-log-forwarder-configuration.yaml dynatrace-aws-s3-log-forwarder-s3-bucket-configuration.yaml eventbridge-cross-region-or-account-forward-rules.yaml",
          "aws s3 cp templates.zip s3://dynatrace-aws-s3-log-forwarder-assets/${TRAVIS_TAG}/"
        ]
      }
    ]
  }
}