Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dependency Upgrades #159

Merged
merged 11 commits into from
Nov 25, 2022
Merged

Dependency Upgrades #159

merged 11 commits into from
Nov 25, 2022

Conversation

GrantBirki
Copy link
Owner

@GrantBirki GrantBirki commented Nov 25, 2022

This pull request does the following:

  • Updates and improves CI workflows
  • Updates many pypi (python) packages
  • Upgrades the bot to python 3.11
  • Migrations for RiotAPI due to new package version
  • Upgrades to Discord.py v2.1.0
  • Fixes a bug with the BOT_ADMINS to strip out @ chars as they are now present post upgrade from Discord.py Upgrade #152

@GrantBirki GrantBirki added the dependencies Pull requests that update a dependency file label Nov 25, 2022
@github-actions
Copy link

Terraform Plan - aws - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.dynamodb_botdata.aws_dynamodb_table.this[0]: Refreshing state... [id=botdata]
module.dynamodb_table_loud.aws_dynamodb_table.this[0]: Refreshing state... [id=loud]
module.dynamodb_table_tts.aws_dynamodb_table.this[0]: Refreshing state... [id=tts]
module.dynamodb_eft_tracker.aws_dynamodb_table.this[0]: Refreshing state... [id=eftitemtracker]
module.dynamodb_table.aws_dynamodb_table.this[0]: Refreshing state... [id=remember]
module.dynamodb_table_play.aws_dynamodb_table.this[0]: Refreshing state... [id=play]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/aws, Workflow: ci

Terraform Plan - k8s-cluster - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
azurerm_virtual_network.vnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet]
azurerm_container_registry.acr: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr]
azurerm_network_security_group.nsg: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/networkSecurityGroups/errbot_nsg]
azurerm_subnet.subnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourcegroups/errbot/providers/Microsoft.ContainerService/managedClusters/errbot-k8s]
azurerm_subnet_network_security_group_association.nsg_association: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_role_assignment.role_acrpull: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr/providers/Microsoft.Authorization/roleAssignments/98ebabba-07cf-a90e-33da-d7cc741a3adc]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s-cluster, Workflow: ci

Terraform Plan - k8s - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.promtail.kubectl_manifest.promtail_configmap[0]: Refreshing state... [id=/api/v1/namespaces/default/configmaps/promtail-config]
module.errbot.kubectl_manifest.errbot_namespace[1]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/default-deny]
module.promtail.kubectl_manifest.promtail_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/default/daemonsets/promtail]
module.errbot.kubectl_manifest.errbot_network_policy[0]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/errbot-network-policy]
module.promtail.kubectl_manifest.promtail_deployment[3]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/promtail]
module.promtail.kubectl_manifest.promtail_deployment[1]: Refreshing state... [id=/api/v1/namespaces/default/serviceaccounts/promtail]
module.promtail.kubectl_manifest.promtail_deployment[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/promtail]
module.errbot.kubectl_manifest.errbot_secret[0]: Refreshing state... [id=/api/v1/namespaces/errbot/secrets/errbot-secret]
module.errbot.kubectl_manifest.errbot_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/errbot/deployments/errbot]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.errbot.kubectl_manifest.errbot_deployment[0] will be updated in-place
  ~ resource "kubectl_manifest" "errbot_deployment" {
        id                      = "/apis/apps/v1/namespaces/errbot/deployments/errbot"
        name                    = "errbot"
      ~ yaml_body               = (sensitive value)
      ~ yaml_body_parsed        = <<-EOT
            apiVersion: apps/v1
            kind: Deployment
            metadata:
              labels:
                name: errbot
              name: errbot
              namespace: errbot
            spec:
              replicas: 1
              selector:
                matchLabels:
                  name: errbot
              strategy: {}
              template:
                metadata:
                  annotations:
                    seccompProfile.security.alpha.kubernetes.io/pod: runtime/default
                  labels:
                    name: errbot
                spec:
                  automountServiceAccountToken: false
                  containers:
                  - env:
                    - name: BOT_NAME
                      value: errbot
                    - name: BACKEND
                      value: Discord
                    - name: BOT_STATUS_MESSAGE
                      value: errbot.birki.io | .help
                    - name: BOT_PREFIX
                      value: .
                    - name: BOT_HOME_CHANNEL
                      value: errbot
                    - name: DOCS_URL
                      value: https://errbot.birki.io
                    - name: BOT_ADMINS
                      value: '@Birki#0001'
                    - name: BOT_EXTRA_BACKEND_DIR
                      value: /app/backend/err-backend-discord
                    - name: DISABLE_EFT_CRON
                      value: "False"
                    - name: DISABLE_LEAGUE_CRON
                      value: "False"
                    - name: RIOT_REGION
                      value: na1
                    - name: RIOT_REGION_V5
                      value: AMERICAS
                    - name: IMAGE_TAG
          -           value: 0b22f813ad7a529931a1b03c653afacf7958b020
          +           value: 0fb76b7b240a6e1e80d6cd61e8127ab17cf51f0c
                    - name: SERVER_LOCK_ALLOW_LIST
                      value: "66199319505543168"
                    - name: CHAT_SERVICE_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: CHAT_SERVICE_TOKEN
                          name: errbot-secret
                    - name: RIOT_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: RIOT_TOKEN
                          name: errbot-secret
                    - name: AWS_ACCESS_KEY_ID
                      valueFrom:
                        secretKeyRef:
                          key: AWS_ACCESS_KEY_ID
                          name: errbot-secret
                    - name: AWS_SECRET_ACCESS_KEY
                      valueFrom:
                        secretKeyRef:
                          key: AWS_SECRET_ACCESS_KEY
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_ID
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_ID
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_SECRET
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_SECRET
                          name: errbot-secret
                    - name: SENTRY
                      valueFrom:
                        secretKeyRef:
                          key: SENTRY
                          name: errbot-secret
                    - name: GEOLOCATION_KEY
                      valueFrom:
                        secretKeyRef:
                          key: GEOLOCATION_KEY
                          name: errbot-secret
          -         image: errbotacr.azurecr.io/errbot:0b22f813ad7a529931a1b03c653afacf7958b020
          +         image: errbotacr.azurecr.io/errbot:0fb76b7b240a6e1e80d6cd61e8127ab17cf51f0c
                    imagePullPolicy: Always
                    name: errbot
                    resources:
                      limits:
                        cpu: "1.4"
                        memory: 1.5Gi
                      requests:
                        cpu: "0.40"
                        memory: 200Mi
                    securityContext:
                      allowPrivilegeEscalation: false
                      capabilities:
                        drop:
                        - ALL
                      privileged: false
                      runAsNonRoot: true
                      runAsUser: 10001
        EOT
        # (11 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Changes to Outputs:
  ~ errbot_image_tag = "0b22f813ad7a529931a1b03c653afacf7958b020" -> "0fb76b7b240a6e1e80d6cd61e8127ab17cf51f0c"

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s, Workflow: ci

@github-actions
Copy link

❌ Linting Failed ❌

You will need to properly lint your code before CI can pass

Run the following script to lint your code:

script/lint

Or manually lint the repo from the command line:

$ pip install black && black .
...
All done! ✨ 🍰 ✨

If you are running manually, ensure you run the command from the root of the repo

Commit your changes and try again!

@github-actions
Copy link

Terraform Plan - aws - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.dynamodb_eft_tracker.aws_dynamodb_table.this[0]: Refreshing state... [id=eftitemtracker]
module.dynamodb_table_play.aws_dynamodb_table.this[0]: Refreshing state... [id=play]
module.dynamodb_table_loud.aws_dynamodb_table.this[0]: Refreshing state... [id=loud]
module.dynamodb_table_tts.aws_dynamodb_table.this[0]: Refreshing state... [id=tts]
module.dynamodb_table_sparkle.aws_dynamodb_table.this[0]: Refreshing state... [id=sparkle]
module.dynamodb_table.aws_dynamodb_table.this[0]: Refreshing state... [id=remember]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/aws, Workflow: ci

Terraform Plan - k8s-cluster - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
azurerm_virtual_network.vnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet]
azurerm_container_registry.acr: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr]
azurerm_network_security_group.nsg: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/networkSecurityGroups/errbot_nsg]
azurerm_subnet.subnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_subnet_network_security_group_association.nsg_association: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourcegroups/errbot/providers/Microsoft.ContainerService/managedClusters/errbot-k8s]
azurerm_role_assignment.role_acrpull: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr/providers/Microsoft.Authorization/roleAssignments/98ebabba-07cf-a90e-33da-d7cc741a3adc]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s-cluster, Workflow: ci

Terraform Plan - k8s - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.errbot.kubectl_manifest.errbot_namespace[0]: Refreshing state... [id=/api/v1/namespaces/errbot]
module.errbot.kubectl_manifest.errbot_network_policy[0]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/errbot-network-policy]
module.errbot.kubectl_manifest.errbot_secret[0]: Refreshing state... [id=/api/v1/namespaces/errbot/secrets/errbot-secret]
module.promtail.kubectl_manifest.promtail_configmap[0]: Refreshing state... [id=/api/v1/namespaces/default/configmaps/promtail-config]
module.promtail.kubectl_manifest.promtail_deployment[3]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/promtail]
module.promtail.kubectl_manifest.promtail_deployment[1]: Refreshing state... [id=/api/v1/namespaces/default/serviceaccounts/promtail]
module.promtail.kubectl_manifest.promtail_deployment[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/promtail]
module.promtail.kubectl_manifest.promtail_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/default/daemonsets/promtail]
module.errbot.kubectl_manifest.errbot_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/errbot/deployments/errbot]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.errbot.kubectl_manifest.errbot_deployment[0] will be updated in-place
  ~ resource "kubectl_manifest" "errbot_deployment" {
        id                      = "/apis/apps/v1/namespaces/errbot/deployments/errbot"
        name                    = "errbot"
      ~ yaml_body               = (sensitive value)
      ~ yaml_body_parsed        = <<-EOT
            apiVersion: apps/v1
            kind: Deployment
            metadata:
              labels:
                name: errbot
              name: errbot
              namespace: errbot
            spec:
              replicas: 1
              selector:
                matchLabels:
                  name: errbot
              strategy: {}
              template:
                metadata:
                  annotations:
                    seccompProfile.security.alpha.kubernetes.io/pod: runtime/default
                  labels:
                    name: errbot
                spec:
                  automountServiceAccountToken: false
                  containers:
                  - env:
                    - name: BOT_NAME
                      value: errbot
                    - name: BACKEND
                      value: Discord
                    - name: BOT_STATUS_MESSAGE
                      value: errbot.birki.io | .help
                    - name: BOT_PREFIX
                      value: .
                    - name: BOT_HOME_CHANNEL
                      value: errbot
                    - name: DOCS_URL
                      value: https://errbot.birki.io
                    - name: BOT_ADMINS
                      value: '@Birki#0001'
                    - name: BOT_EXTRA_BACKEND_DIR
                      value: /app/backend/err-backend-discord
                    - name: DISABLE_EFT_CRON
                      value: "False"
                    - name: DISABLE_LEAGUE_CRON
                      value: "False"
                    - name: RIOT_REGION
                      value: na1
                    - name: RIOT_REGION_V5
                      value: AMERICAS
                    - name: IMAGE_TAG
          -           value: 0b22f813ad7a529931a1b03c653afacf7958b020
          +           value: db180d5b56ff6b3c2ba61b1479d8dc6797b348d3
                    - name: SERVER_LOCK_ALLOW_LIST
                      value: "66199319505543168"
                    - name: CHAT_SERVICE_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: CHAT_SERVICE_TOKEN
                          name: errbot-secret
                    - name: RIOT_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: RIOT_TOKEN
                          name: errbot-secret
                    - name: AWS_ACCESS_KEY_ID
                      valueFrom:
                        secretKeyRef:
                          key: AWS_ACCESS_KEY_ID
                          name: errbot-secret
                    - name: AWS_SECRET_ACCESS_KEY
                      valueFrom:
                        secretKeyRef:
                          key: AWS_SECRET_ACCESS_KEY
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_ID
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_ID
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_SECRET
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_SECRET
                          name: errbot-secret
                    - name: SENTRY
                      valueFrom:
                        secretKeyRef:
                          key: SENTRY
                          name: errbot-secret
                    - name: GEOLOCATION_KEY
                      valueFrom:
                        secretKeyRef:
                          key: GEOLOCATION_KEY
                          name: errbot-secret
          -         image: errbotacr.azurecr.io/errbot:0b22f813ad7a529931a1b03c653afacf7958b020
          +         image: errbotacr.azurecr.io/errbot:db180d5b56ff6b3c2ba61b1479d8dc6797b348d3
                    imagePullPolicy: Always
                    name: errbot
                    resources:
                      limits:
                        cpu: "1.4"
                        memory: 1.5Gi
                      requests:
                        cpu: "0.40"
                        memory: 200Mi
                    securityContext:
                      allowPrivilegeEscalation: false
                      capabilities:
                        drop:
                        - ALL
                      privileged: false
                      runAsNonRoot: true
                      runAsUser: 10001
        EOT
        # (11 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Changes to Outputs:
  ~ errbot_image_tag = "0b22f813ad7a529931a1b03c653afacf7958b020" -> "db180d5b56ff6b3c2ba61b1479d8dc6797b348d3"

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s, Workflow: ci

@github-actions
Copy link

Terraform Plan - aws - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.dynamodb_table_tts.aws_dynamodb_table.this[0]: Refreshing state... [id=tts]
module.dynamodb_table_loud.aws_dynamodb_table.this[0]: Refreshing state... [id=loud]
module.dynamodb_table.aws_dynamodb_table.this[0]: Refreshing state... [id=remember]
module.dynamodb_eft_tracker.aws_dynamodb_table.this[0]: Refreshing state... [id=eftitemtracker]
module.dynamodb_table_sparkle.aws_dynamodb_table.this[0]: Refreshing state... [id=sparkle]
module.dynamodb_botdata.aws_dynamodb_table.this[0]: Refreshing state... [id=botdata]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/aws, Workflow: ci

Terraform Plan - k8s-cluster - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
azurerm_virtual_network.vnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet]
azurerm_network_security_group.nsg: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/networkSecurityGroups/errbot_nsg]
azurerm_container_registry.acr: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr]
azurerm_subnet.subnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_subnet_network_security_group_association.nsg_association: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourcegroups/errbot/providers/Microsoft.ContainerService/managedClusters/errbot-k8s]
azurerm_role_assignment.role_acrpull: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr/providers/Microsoft.Authorization/roleAssignments/98ebabba-07cf-a90e-33da-d7cc741a3adc]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s-cluster, Workflow: ci

Terraform Plan - k8s - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.promtail.kubectl_manifest.promtail_configmap[0]: Refreshing state... [id=/api/v1/namespaces/default/configmaps/promtail-config]
module.errbot.kubectl_manifest.errbot_namespace[0]: Refreshing state... [id=/api/v1/namespaces/errbot]
module.errbot.kubectl_manifest.errbot_network_policy[0]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/errbot-network-policy]
module.errbot.kubectl_manifest.errbot_secret[0]: Refreshing state... [id=/api/v1/namespaces/errbot/secrets/errbot-secret]
module.promtail.kubectl_manifest.promtail_deployment[3]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/promtail]
module.promtail.kubectl_manifest.promtail_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/default/daemonsets/promtail]
module.promtail.kubectl_manifest.promtail_deployment[1]: Refreshing state... [id=/api/v1/namespaces/default/serviceaccounts/promtail]
module.errbot.kubectl_manifest.errbot_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/errbot/deployments/errbot]
module.promtail.kubectl_manifest.promtail_deployment[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/promtail]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.errbot.kubectl_manifest.errbot_deployment[0] will be updated in-place
  ~ resource "kubectl_manifest" "errbot_deployment" {
        id                      = "/apis/apps/v1/namespaces/errbot/deployments/errbot"
        name                    = "errbot"
      ~ yaml_body               = (sensitive value)
      ~ yaml_body_parsed        = <<-EOT
            apiVersion: apps/v1
            kind: Deployment
            metadata:
              labels:
                name: errbot
              name: errbot
              namespace: errbot
            spec:
              replicas: 1
              selector:
                matchLabels:
                  name: errbot
              strategy: {}
              template:
                metadata:
                  annotations:
                    seccompProfile.security.alpha.kubernetes.io/pod: runtime/default
                  labels:
                    name: errbot
                spec:
                  automountServiceAccountToken: false
                  containers:
                  - env:
                    - name: BOT_NAME
                      value: errbot
                    - name: BACKEND
                      value: Discord
                    - name: BOT_STATUS_MESSAGE
                      value: errbot.birki.io | .help
                    - name: BOT_PREFIX
                      value: .
                    - name: BOT_HOME_CHANNEL
                      value: errbot
                    - name: DOCS_URL
                      value: https://errbot.birki.io
                    - name: BOT_ADMINS
                      value: '@Birki#0001'
                    - name: BOT_EXTRA_BACKEND_DIR
                      value: /app/backend/err-backend-discord
                    - name: DISABLE_EFT_CRON
                      value: "False"
                    - name: DISABLE_LEAGUE_CRON
                      value: "False"
                    - name: RIOT_REGION
                      value: na1
                    - name: RIOT_REGION_V5
                      value: AMERICAS
                    - name: IMAGE_TAG
          -           value: 0b22f813ad7a529931a1b03c653afacf7958b020
          +           value: ec13bf24f9b7b50f4ca5fa069e5cbc00609d4083
                    - name: SERVER_LOCK_ALLOW_LIST
                      value: "66199319505543168"
                    - name: CHAT_SERVICE_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: CHAT_SERVICE_TOKEN
                          name: errbot-secret
                    - name: RIOT_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: RIOT_TOKEN
                          name: errbot-secret
                    - name: AWS_ACCESS_KEY_ID
                      valueFrom:
                        secretKeyRef:
                          key: AWS_ACCESS_KEY_ID
                          name: errbot-secret
                    - name: AWS_SECRET_ACCESS_KEY
                      valueFrom:
                        secretKeyRef:
                          key: AWS_SECRET_ACCESS_KEY
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_ID
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_ID
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_SECRET
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_SECRET
                          name: errbot-secret
                    - name: SENTRY
                      valueFrom:
                        secretKeyRef:
                          key: SENTRY
                          name: errbot-secret
                    - name: GEOLOCATION_KEY
                      valueFrom:
                        secretKeyRef:
                          key: GEOLOCATION_KEY
                          name: errbot-secret
          -         image: errbotacr.azurecr.io/errbot:0b22f813ad7a529931a1b03c653afacf7958b020
          +         image: errbotacr.azurecr.io/errbot:ec13bf24f9b7b50f4ca5fa069e5cbc00609d4083
                    imagePullPolicy: Always
                    name: errbot
                    resources:
                      limits:
                        cpu: "1.4"
                        memory: 1.5Gi
                      requests:
                        cpu: "0.40"
                        memory: 200Mi
                    securityContext:
                      allowPrivilegeEscalation: false
                      capabilities:
                        drop:
                        - ALL
                      privileged: false
                      runAsNonRoot: true
                      runAsUser: 10001
        EOT
        # (11 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Changes to Outputs:
  ~ errbot_image_tag = "0b22f813ad7a529931a1b03c653afacf7958b020" -> "ec13bf24f9b7b50f4ca5fa069e5cbc00609d4083"

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s, Workflow: ci

@github-actions
Copy link

Terraform Plan - aws - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.dynamodb_table_play.aws_dynamodb_table.this[0]: Refreshing state... [id=play]
module.dynamodb_table.aws_dynamodb_table.this[0]: Refreshing state... [id=remember]
module.dynamodb_eft_tracker.aws_dynamodb_table.this[0]: Refreshing state... [id=eftitemtracker]
module.dynamodb_table_tts.aws_dynamodb_table.this[0]: Refreshing state... [id=tts]
module.dynamodb_botdata.aws_dynamodb_table.this[0]: Refreshing state... [id=botdata]
module.dynamodb_table_sparkle.aws_dynamodb_table.this[0]: Refreshing state... [id=sparkle]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/aws, Workflow: ci

Terraform Plan - k8s-cluster - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
azurerm_container_registry.acr: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr]
azurerm_network_security_group.nsg: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/networkSecurityGroups/errbot_nsg]
azurerm_virtual_network.vnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet]
azurerm_subnet.subnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_subnet_network_security_group_association.nsg_association: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourcegroups/errbot/providers/Microsoft.ContainerService/managedClusters/errbot-k8s]
azurerm_role_assignment.role_acrpull: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr/providers/Microsoft.Authorization/roleAssignments/98ebabba-07cf-a90e-33da-d7cc741a3adc]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s-cluster, Workflow: ci

Terraform Plan - k8s - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.errbot.kubectl_manifest.errbot_namespace[1]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/default-deny]
module.promtail.kubectl_manifest.promtail_configmap[0]: Refreshing state... [id=/api/v1/namespaces/default/configmaps/promtail-config]
module.errbot.kubectl_manifest.errbot_secret[0]: Refreshing state... [id=/api/v1/namespaces/errbot/secrets/errbot-secret]
module.errbot.kubectl_manifest.errbot_network_policy[0]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/errbot-network-policy]
module.promtail.kubectl_manifest.promtail_deployment[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/promtail]
module.promtail.kubectl_manifest.promtail_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/default/daemonsets/promtail]
module.promtail.kubectl_manifest.promtail_deployment[3]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/promtail]
module.promtail.kubectl_manifest.promtail_deployment[1]: Refreshing state... [id=/api/v1/namespaces/default/serviceaccounts/promtail]
module.errbot.kubectl_manifest.errbot_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/errbot/deployments/errbot]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.errbot.kubectl_manifest.errbot_deployment[0] will be updated in-place
  ~ resource "kubectl_manifest" "errbot_deployment" {
        id                      = "/apis/apps/v1/namespaces/errbot/deployments/errbot"
        name                    = "errbot"
      ~ yaml_body               = (sensitive value)
      ~ yaml_body_parsed        = <<-EOT
            apiVersion: apps/v1
            kind: Deployment
            metadata:
              labels:
                name: errbot
              name: errbot
              namespace: errbot
            spec:
              replicas: 1
              selector:
                matchLabels:
                  name: errbot
              strategy: {}
              template:
                metadata:
                  annotations:
                    seccompProfile.security.alpha.kubernetes.io/pod: runtime/default
                  labels:
                    name: errbot
                spec:
                  automountServiceAccountToken: false
                  containers:
                  - env:
                    - name: BOT_NAME
                      value: errbot
                    - name: BACKEND
                      value: Discord
                    - name: BOT_STATUS_MESSAGE
                      value: errbot.birki.io | .help
                    - name: BOT_PREFIX
                      value: .
                    - name: BOT_HOME_CHANNEL
                      value: errbot
                    - name: DOCS_URL
                      value: https://errbot.birki.io
                    - name: BOT_ADMINS
                      value: '@Birki#0001'
                    - name: BOT_EXTRA_BACKEND_DIR
                      value: /app/backend/err-backend-discord
                    - name: DISABLE_EFT_CRON
                      value: "False"
                    - name: DISABLE_LEAGUE_CRON
                      value: "False"
                    - name: RIOT_REGION
                      value: na1
                    - name: RIOT_REGION_V5
                      value: AMERICAS
                    - name: IMAGE_TAG
          -           value: 0b22f813ad7a529931a1b03c653afacf7958b020
          +           value: a461a66cae727322e05bda06441c6544b60c81f5
                    - name: SERVER_LOCK_ALLOW_LIST
                      value: "66199319505543168"
                    - name: CHAT_SERVICE_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: CHAT_SERVICE_TOKEN
                          name: errbot-secret
                    - name: RIOT_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: RIOT_TOKEN
                          name: errbot-secret
                    - name: AWS_ACCESS_KEY_ID
                      valueFrom:
                        secretKeyRef:
                          key: AWS_ACCESS_KEY_ID
                          name: errbot-secret
                    - name: AWS_SECRET_ACCESS_KEY
                      valueFrom:
                        secretKeyRef:
                          key: AWS_SECRET_ACCESS_KEY
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_ID
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_ID
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_SECRET
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_SECRET
                          name: errbot-secret
                    - name: SENTRY
                      valueFrom:
                        secretKeyRef:
                          key: SENTRY
                          name: errbot-secret
                    - name: GEOLOCATION_KEY
                      valueFrom:
                        secretKeyRef:
                          key: GEOLOCATION_KEY
                          name: errbot-secret
          -         image: errbotacr.azurecr.io/errbot:0b22f813ad7a529931a1b03c653afacf7958b020
          +         image: errbotacr.azurecr.io/errbot:a461a66cae727322e05bda06441c6544b60c81f5
                    imagePullPolicy: Always
                    name: errbot
                    resources:
                      limits:
                        cpu: "1.4"
                        memory: 1.5Gi
                      requests:
                        cpu: "0.40"
                        memory: 200Mi
                    securityContext:
                      allowPrivilegeEscalation: false
                      capabilities:
                        drop:
                        - ALL
                      privileged: false
                      runAsNonRoot: true
                      runAsUser: 10001
        EOT
        # (11 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Changes to Outputs:
  ~ errbot_image_tag = "0b22f813ad7a529931a1b03c653afacf7958b020" -> "a461a66cae727322e05bda06441c6544b60c81f5"

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s, Workflow: ci

@GrantBirki GrantBirki added the bug Something isn't working label Nov 25, 2022
@GrantBirki GrantBirki changed the title Update python packages Dependency Upgrades Nov 25, 2022
@github-actions
Copy link

Terraform Plan - aws - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.dynamodb_table_sparkle.aws_dynamodb_table.this[0]: Refreshing state... [id=sparkle]
module.dynamodb_table_play.aws_dynamodb_table.this[0]: Refreshing state... [id=play]
module.dynamodb_eft_tracker.aws_dynamodb_table.this[0]: Refreshing state... [id=eftitemtracker]
module.dynamodb_botdata.aws_dynamodb_table.this[0]: Refreshing state... [id=botdata]
module.dynamodb_table_tts.aws_dynamodb_table.this[0]: Refreshing state... [id=tts]
module.dynamodb_table_loud.aws_dynamodb_table.this[0]: Refreshing state... [id=loud]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.
Releasing state lock. This may take a few moments...

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/aws, Workflow: ci

Terraform Plan - k8s-cluster - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
azurerm_container_registry.acr: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr]
azurerm_virtual_network.vnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet]
azurerm_network_security_group.nsg: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/networkSecurityGroups/errbot_nsg]
azurerm_subnet.subnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_subnet_network_security_group_association.nsg_association: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourcegroups/errbot/providers/Microsoft.ContainerService/managedClusters/errbot-k8s]
azurerm_role_assignment.role_acrpull: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr/providers/Microsoft.Authorization/roleAssignments/98ebabba-07cf-a90e-33da-d7cc741a3adc]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s-cluster, Workflow: ci

Terraform Plan - k8s - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.errbot.kubectl_manifest.errbot_namespace[0]: Refreshing state... [id=/api/v1/namespaces/errbot]
module.errbot.kubectl_manifest.errbot_namespace[1]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/default-deny]
module.errbot.kubectl_manifest.errbot_secret[0]: Refreshing state... [id=/api/v1/namespaces/errbot/secrets/errbot-secret]
module.errbot.kubectl_manifest.errbot_network_policy[0]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/errbot-network-policy]
module.promtail.kubectl_manifest.promtail_deployment[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/promtail]
module.promtail.kubectl_manifest.promtail_deployment[3]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/promtail]
module.promtail.kubectl_manifest.promtail_deployment[1]: Refreshing state... [id=/api/v1/namespaces/default/serviceaccounts/promtail]
module.promtail.kubectl_manifest.promtail_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/default/daemonsets/promtail]
module.errbot.kubectl_manifest.errbot_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/errbot/deployments/errbot]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.errbot.kubectl_manifest.errbot_deployment[0] will be updated in-place
  ~ resource "kubectl_manifest" "errbot_deployment" {
        id                      = "/apis/apps/v1/namespaces/errbot/deployments/errbot"
        name                    = "errbot"
      ~ yaml_body               = (sensitive value)
      ~ yaml_body_parsed        = <<-EOT
            apiVersion: apps/v1
            kind: Deployment
            metadata:
              labels:
                name: errbot
              name: errbot
              namespace: errbot
            spec:
              replicas: 1
              selector:
                matchLabels:
                  name: errbot
              strategy: {}
              template:
                metadata:
                  annotations:
                    seccompProfile.security.alpha.kubernetes.io/pod: runtime/default
                  labels:
                    name: errbot
                spec:
                  automountServiceAccountToken: false
                  containers:
                  - env:
                    - name: BOT_NAME
                      value: errbot
                    - name: BACKEND
                      value: Discord
                    - name: BOT_STATUS_MESSAGE
                      value: errbot.birki.io | .help
                    - name: BOT_PREFIX
                      value: .
                    - name: BOT_HOME_CHANNEL
                      value: errbot
                    - name: DOCS_URL
                      value: https://errbot.birki.io
                    - name: BOT_ADMINS
                      value: '@Birki#0001'
                    - name: BOT_EXTRA_BACKEND_DIR
                      value: /app/backend/err-backend-discord
                    - name: DISABLE_EFT_CRON
                      value: "False"
                    - name: DISABLE_LEAGUE_CRON
                      value: "False"
                    - name: RIOT_REGION
                      value: na1
                    - name: RIOT_REGION_V5
                      value: AMERICAS
                    - name: IMAGE_TAG
          -           value: 0b22f813ad7a529931a1b03c653afacf7958b020
          +           value: 697f5a336c130bf0e46f676614b7ff5de81b48fb
                    - name: SERVER_LOCK_ALLOW_LIST
                      value: "66199319505543168"
                    - name: CHAT_SERVICE_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: CHAT_SERVICE_TOKEN
                          name: errbot-secret
                    - name: RIOT_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: RIOT_TOKEN
                          name: errbot-secret
                    - name: AWS_ACCESS_KEY_ID
                      valueFrom:
                        secretKeyRef:
                          key: AWS_ACCESS_KEY_ID
                          name: errbot-secret
                    - name: AWS_SECRET_ACCESS_KEY
                      valueFrom:
                        secretKeyRef:
                          key: AWS_SECRET_ACCESS_KEY
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_ID
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_ID
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_SECRET
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_SECRET
                          name: errbot-secret
                    - name: SENTRY
                      valueFrom:
                        secretKeyRef:
                          key: SENTRY
                          name: errbot-secret
                    - name: GEOLOCATION_KEY
                      valueFrom:
                        secretKeyRef:
                          key: GEOLOCATION_KEY
                          name: errbot-secret
          -         image: errbotacr.azurecr.io/errbot:0b22f813ad7a529931a1b03c653afacf7958b020
          +         image: errbotacr.azurecr.io/errbot:697f5a336c130bf0e46f676614b7ff5de81b48fb
                    imagePullPolicy: Always
                    name: errbot
                    resources:
                      limits:
                        cpu: "1.4"
                        memory: 1.5Gi
                      requests:
                        cpu: "0.40"
                        memory: 200Mi
                    securityContext:
                      allowPrivilegeEscalation: false
                      capabilities:
                        drop:
                        - ALL
                      privileged: false
                      runAsNonRoot: true
                      runAsUser: 10001
        EOT
        # (11 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Changes to Outputs:
  ~ errbot_image_tag = "0b22f813ad7a529931a1b03c653afacf7958b020" -> "697f5a336c130bf0e46f676614b7ff5de81b48fb"

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s, Workflow: ci

@github-actions
Copy link

Terraform Plan - aws - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.dynamodb_eft_tracker.aws_dynamodb_table.this[0]: Refreshing state... [id=eftitemtracker]
module.dynamodb_table_tts.aws_dynamodb_table.this[0]: Refreshing state... [id=tts]
module.dynamodb_table_play.aws_dynamodb_table.this[0]: Refreshing state... [id=play]
module.dynamodb_botdata.aws_dynamodb_table.this[0]: Refreshing state... [id=botdata]
module.dynamodb_table.aws_dynamodb_table.this[0]: Refreshing state... [id=remember]
module.dynamodb_table_loud.aws_dynamodb_table.this[0]: Refreshing state... [id=loud]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/aws, Workflow: ci

Terraform Plan - k8s-cluster - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
azurerm_virtual_network.vnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet]
azurerm_container_registry.acr: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr]
azurerm_network_security_group.nsg: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/networkSecurityGroups/errbot_nsg]
azurerm_subnet.subnet: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_subnet_network_security_group_association.nsg_association: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.Network/virtualNetworks/errbot_vnet/subnets/errbot_default_subnet]
azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourcegroups/errbot/providers/Microsoft.ContainerService/managedClusters/errbot-k8s]
azurerm_role_assignment.role_acrpull: Refreshing state... [id=/subscriptions/4321e9c7-b790-4d6b-a13c-2fac24800deb/resourceGroups/errbot/providers/Microsoft.ContainerRegistry/registries/errbotacr/providers/Microsoft.Authorization/roleAssignments/98ebabba-07cf-a90e-33da-d7cc741a3adc]

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s-cluster, Workflow: ci

Terraform Plan - k8s - Production 🪐

  • Terraform Format and Style 🖌: success
  • Terraform Initialization ⚙️: success
  • Terraform Validation 🤖: success
  • Terraform Plan 📖: success
Show Plan
module.errbot.kubectl_manifest.errbot_namespace[0]: Refreshing state... [id=/api/v1/namespaces/errbot]
module.promtail.kubectl_manifest.promtail_configmap[0]: Refreshing state... [id=/api/v1/namespaces/default/configmaps/promtail-config]
module.promtail.kubectl_manifest.promtail_deployment[1]: Refreshing state... [id=/api/v1/namespaces/default/serviceaccounts/promtail]
module.errbot.kubectl_manifest.errbot_secret[0]: Refreshing state... [id=/api/v1/namespaces/errbot/secrets/errbot-secret]
module.errbot.kubectl_manifest.errbot_network_policy[0]: Refreshing state... [id=/apis/networking.k8s.io/v1/namespaces/errbot/networkpolicys/errbot-network-policy]
module.promtail.kubectl_manifest.promtail_deployment[2]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterroles/promtail]
module.promtail.kubectl_manifest.promtail_deployment[3]: Refreshing state... [id=/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/promtail]
module.promtail.kubectl_manifest.promtail_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/default/daemonsets/promtail]
module.errbot.kubectl_manifest.errbot_deployment[0]: Refreshing state... [id=/apis/apps/v1/namespaces/errbot/deployments/errbot]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # module.errbot.kubectl_manifest.errbot_deployment[0] will be updated in-place
  ~ resource "kubectl_manifest" "errbot_deployment" {
        id                      = "/apis/apps/v1/namespaces/errbot/deployments/errbot"
        name                    = "errbot"
      ~ yaml_body               = (sensitive value)
      ~ yaml_body_parsed        = <<-EOT
            apiVersion: apps/v1
            kind: Deployment
            metadata:
              labels:
                name: errbot
              name: errbot
              namespace: errbot
            spec:
              replicas: 1
              selector:
                matchLabels:
                  name: errbot
              strategy: {}
              template:
                metadata:
                  annotations:
                    seccompProfile.security.alpha.kubernetes.io/pod: runtime/default
                  labels:
                    name: errbot
                spec:
                  automountServiceAccountToken: false
                  containers:
                  - env:
                    - name: BOT_NAME
                      value: errbot
                    - name: BACKEND
                      value: Discord
                    - name: BOT_STATUS_MESSAGE
                      value: errbot.birki.io | .help
                    - name: BOT_PREFIX
                      value: .
                    - name: BOT_HOME_CHANNEL
                      value: errbot
                    - name: DOCS_URL
                      value: https://errbot.birki.io
                    - name: BOT_ADMINS
                      value: '@Birki#0001'
                    - name: BOT_EXTRA_BACKEND_DIR
                      value: /app/backend/err-backend-discord
                    - name: DISABLE_EFT_CRON
                      value: "False"
                    - name: DISABLE_LEAGUE_CRON
                      value: "False"
                    - name: RIOT_REGION
                      value: na1
                    - name: RIOT_REGION_V5
                      value: AMERICAS
                    - name: IMAGE_TAG
          -           value: 0b22f813ad7a529931a1b03c653afacf7958b020
          +           value: 08a31c16e145e8ba5d57546bc86ba6b36906467f
                    - name: SERVER_LOCK_ALLOW_LIST
                      value: "66199319505543168"
                    - name: CHAT_SERVICE_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: CHAT_SERVICE_TOKEN
                          name: errbot-secret
                    - name: RIOT_TOKEN
                      valueFrom:
                        secretKeyRef:
                          key: RIOT_TOKEN
                          name: errbot-secret
                    - name: AWS_ACCESS_KEY_ID
                      valueFrom:
                        secretKeyRef:
                          key: AWS_ACCESS_KEY_ID
                          name: errbot-secret
                    - name: AWS_SECRET_ACCESS_KEY
                      valueFrom:
                        secretKeyRef:
                          key: AWS_SECRET_ACCESS_KEY
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_ID
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_ID
                          name: errbot-secret
                    - name: SPOTIFY_CLIENT_SECRET
                      valueFrom:
                        secretKeyRef:
                          key: SPOTIFY_CLIENT_SECRET
                          name: errbot-secret
                    - name: SENTRY
                      valueFrom:
                        secretKeyRef:
                          key: SENTRY
                          name: errbot-secret
                    - name: GEOLOCATION_KEY
                      valueFrom:
                        secretKeyRef:
                          key: GEOLOCATION_KEY
                          name: errbot-secret
          -         image: errbotacr.azurecr.io/errbot:0b22f813ad7a529931a1b03c653afacf7958b020
          +         image: errbotacr.azurecr.io/errbot:08a31c16e145e8ba5d57546bc86ba6b36906467f
                    imagePullPolicy: Always
                    name: errbot
                    resources:
                      limits:
                        cpu: "1.4"
                        memory: 1.5Gi
                      requests:
                        cpu: "0.40"
                        memory: 200Mi
                    securityContext:
                      allowPrivilegeEscalation: false
                      capabilities:
                        drop:
                        - ALL
                      privileged: false
                      runAsNonRoot: true
                      runAsUser: 10001
        EOT
        # (11 unchanged attributes hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

Changes to Outputs:
  ~ errbot_image_tag = "0b22f813ad7a529931a1b03c653afacf7958b020" -> "08a31c16e145e8ba5d57546bc86ba6b36906467f"

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @GrantBirki, Action: pull_request, Working Directory: terraform/k8s, Workflow: ci

@GrantBirki GrantBirki merged commit 8c33202 into main Nov 25, 2022
@GrantBirki GrantBirki deleted the update-python-packages branch November 25, 2022 04:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant