tpol
03/24/2023, 4:02 PMAli (Infracost)
03/24/2023, 5:28 PMTomas Mota
03/27/2023, 9:12 AMPriyashree Shetty
03/27/2023, 5:06 PMChristoffer Nicklasson
03/28/2023, 10:19 AMMustafa Mujahid
03/28/2023, 12:46 PMalex
03/28/2023, 1:57 PMMarcelo Leandro
03/29/2023, 7:20 AM"No projects are defined in %s. Will resume automatic detection"
https://github.com/runatlantis/atlantis/blob/617714034f533224102f4fa00948e4f5efadbc57/server/events/project_command_builder.go#L381Jonathan
03/29/2023, 11:57 AMv0.23.4
be released?Dan Williams
03/29/2023, 12:17 PM{“level”“warn”,“ts”“2023-03-29T120717.664Z”,“caller”“events/apply command runner.go111",“msg”:“unable to get pull request status: fetching mergeability status for repo: <repo>, and pull number: 2640: getting pull request status: getting required status checks: GET https://api.github.com/repos/<repo>/branches/master/protection: 404 Not Found []. Continuing with mergeable and approved assumed false”,“json”{“repo”“<repo>“,”pull”“2640”},“stacktrace”“github.com/runatlantis/atlantis/server/events.(*ApplyCommandRunner).Run\n\tgithub.com/runatlantis/atlantis/server/events/apply_command_runner.go:111\ngithub.com/runatlantis/atlantis/server/events.(*DefaultCommandRunner).RunCommentCommand\n\tgithub.com/runatlantis/atlantis/server/events/command_runner.go:296”}404 looking for branch protection but we definitely have branch protection set 🤔
jwr
03/30/2023, 2:12 PMjq
the planfile and do different things based on which resources are going to change.
If I need to get a planfile into json locally outside the context of atlantis, I can do:
terraform plan -out=tfplan
terraform show -json tfplan | jq -S .
So inside atlantis, assuming that a plan had already been run, should I expect something like this to work?
workflows:
init-plan-apply:
plan:
steps:
- init
- plan:
extra_args: ["-lock-timeout=300s"]
apply:
steps:
- init
# Do some jq stuff with the plan before applying
- terraform show -json $PLANFILE | jq -S .
- apply:
extra_args: ["-lock-timeout=300s"]
PePe Amengual
03/30/2023, 7:13 PMSujeeth Kumar Chinnaraj
03/31/2023, 1:37 PMjwr
03/31/2023, 5:55 PMpath: /home/atlantis/conftest_policies
as an example. How can I reference the path to my policies using a relative path in my git repository, the same repository from which atlantis would have already run terraform plan
?Priyashree Shetty
04/02/2023, 4:42 PMMarcelo Leandro
04/03/2023, 9:00 AMEither the target module has not been applied yet, or the module has no outputs
jwr
04/03/2023, 4:54 PMapply
step, or do they only run at the end of a plan
step? Like if I had a no-friday-deploys policy, and someone runs atlantis plan
on Thursday, then the policy would pass. And if they come back to their PR again on Friday and run atlantis apply
, will that apply proceed or will conftest run again and fail before the apply begins?Isaac Wilson
04/03/2023, 6:28 PMDylan Page
04/03/2023, 9:25 PMAyman Azzam
04/04/2023, 9:38 AMatlantis apply
commandIlia Kovalev
04/04/2023, 1:15 PMsuccessfully ran \"terragrunt plan...
Unable to update status error: POST <https://api.github.com/repos/org/repo/statuses/master>: 403 Resource not accessible by integration
github api docs say that /repos/{owner}/{repo}/statuses/{sha}
is the right endpoint, but atlantis is trying to hit /repos/{owner}/{repo}/statuses/{branch}
The full stacktrace:
403 Resource not accessible by integration [])","json":{},"stacktrace":"<http://github.com/runatlantis/atlantis/server/events.(*ProjectOutputWrapper).updateProjectPRStatus|github.com/runatlantis/atlantis/server/events.(*ProjectOutputWrapper).updateProjectPRStatus>\n\tgithub.com/runatlantis/atlantis/server/events/project_command_runner.go:186\ngithub.com/runatlantis/atlantis/server/events.(*ProjectOutputWrapper).Plan\n\tgithub.com/runatlantis/atlantis/server/events/project_command_runner.go:155\ngithub.com/runatlantis/atlantis/server/events.RunAndEmitStats\n\tgithub.com/runatlantis/atlantis/server/events/instrumented_project_command_runner.go:68\ngithub.com/runatlantis/atlantis/server/events.(*InstrumentedProjectCommandRunner).Plan\n\tgithub.com/runatlantis/atlantis/server/events/instrumented_project_command_runner.go:37\ngithub.com/runatlantis/atlantis/server/controllers.(*APIController).apiPlan\n\tgithub.com/runatlantis/atlantis/server/controllers/api_controller.go:152\ngithub.com/runatlantis/atlantis/server/controllers.(*APIController).Plan\n\tgithub.com/runatlantis/atlantis/server/controllers/api_controller.go:90\nnet/http.HandlerFunc.ServeHTTP\n\tnet/http/server.go:2109\ngithub.com/gorilla/mux.(*Router).ServeHTTP\n\tgithub.com/gorilla/mux@v1.8.0/mux.go:210\ngithub.com/urfave/negroni/v3.Wrap.func1\n\tgithub.com/urfave/negroni/v3@v3.0.0/negroni.go:59\ngithub.com/urfave/negroni/v3.HandlerFunc.ServeHTTP\n\tgithub.com/urfave/negroni/v3@v3.0.0/negroni.go:33\ngithub.com/urfave/negroni/v3.middleware.ServeHTTP\n\tgithub.com/urfave/negroni/v3@v3.0.0/negroni.go:51\ngithub.com/runatlantis/atlantis/server.(*RequestLogger).ServeHTTP\n\tgithub.com/runatlantis/atlantis/server/middleware.go:70\ngithub.com/urfave/negroni/v3.middleware.ServeHTTP\n\tgithub.com/urfave/negroni/v3@v3.0.0/negroni.go:51\ngithub.com/urfave/negroni/v3.(*Recovery).ServeHTTP\n\tgithub.com/urfave/negroni/v3@v3.0.0/recovery.go:210\ngithub.com/urfave/negroni/v3.middleware.ServeHTTP\n\tgithub.com/urfave/negroni/v3@v3.0.0/negroni.go:51\ngithub.com/urfave/negroni/v3.(*Negroni).ServeHTTP\n\tgithub.com/urfave/negroni/v3@v3.0.0/negroni.go:111\nnet/http.serverHandler.ServeHTTP\n\tnet/http/server.go:2947\nnet/http.(*conn).serve\n\tnet/http/server.go:1991"}
That causes some troubles:
1. the workspace <workspace> is currently locked by...
2. unable to use pre-workflow-hooks
3. unable to use this project, it fails after hitting /api/plan with a timeout error
What should i do in this case? Thank youPePe Amengual
04/05/2023, 1:13 AMPardeep Bhatt
04/05/2023, 5:54 AM~/.atlantis
using nfs on multiple nodes. We are able to successfully achieve this and if plan request landing on one node and apply request on another node then because of syncing happing for the ~/.atlantis
the apply is running fine and we are good here. But this comes with a new set of problem now i.e. when we have made simultaneous plan requests and when they landed on same node then we are getting the error
Plan Error
The default workspace at path . is currently locked by another command that is running for this pull request.
Wait until the previous command is complete and try again.
which is fine and expected but when the both requests have landed on different-different nodes then there are 3 different scenarios happening
1. first request plan passing and second request plan failing with failed to read plan/state file error.
2. first request plan passing and second request plan failing with error unable to get lock.
3. both request plan are passing.
what we want is to somehow if we can give back this error
Plan Error
The default workspace at path . is currently locked by another command that is running for this pull request.
Wait until the previous command is complete and try again.
back to the user in case of multiple plan requests, then that would be fine and we will be good to go ahead.
Any sort of will be appreciated.
Thanks.Manav Sikka
04/05/2023, 3:00 PMAndrew Best
04/06/2023, 1:15 AMJosh D'Agostino
04/06/2023, 2:23 PMDaniel DeFisher
04/06/2023, 4:19 PMBen Parafina (grimaldi)
04/06/2023, 9:28 PMGeorge
04/10/2023, 6:26 PMGitHub
04/10/2023, 10:27 PMmerge
strategy, reclone when necessary on base update by @finnag in #3187
• fix(deps): update github.com/hashicorp/terraform-config-inspect digest to 71b695b in go.mod by @renovate in #3263
• feat: Flag to disable custom [Atlantis]
commit messages on PR merge by @oliverisaac in #3120
• chore(deps): update actions/stale action to v8 in .github/workflows/stale.yml by @renovate in #3266
• chore(deps): update dependency open-policy-agent/conftest to v0.40.0 in dockerfile.dev by @renovate in #3264
• chore(deps): update dependency open-policy-agent/conftest to v0.40.0 in testing/dockerfile by @renovate in #3265
• fix(workflows): use ** instead of *_/_ in paths by @nitrocode in #3267
• fix(kustomize): Use k8s recommended name label by @shouichi in #3261
• chore(deps): update alpine docker tag to v3.17.3 in docker-base/dockerfile.alpine by @renovate in #3278
• fix(github): branch protection not supported by @tpolekhin in #3276
• fix(gitlab): Add backwards compatible mergability check by @jukie in #3277
• chore(deps): update dependency hashicorp/terraform to v1.4.4 in .circleci/config.yml by @renovate in #3284
• fix(autoplan): modules for per-repo configs by @jukie in #3272
• refactor(atlantis-image): recombine with atlantis-base by @GenPage in #3001
• fix(docker): error in image due to missing dependencies by @GenPage in #3294
• chore(deps): update alpine docker tag to v3.17.3 in dockerfile by @renovate in #3301
• docs(bug): Add required docker version to ACI deployment docs by @patrick-merchant in #3293
New Contributors
• @igaskin made their first contribution in #3255
• @jonathanwiemers made their first contribution in #3208
• @oliverisaac made their first contribution in #3120
• @jukie made their first contribution in #3277
• @patrick-merchant made their first contribution in #3293
Full Changelog: v0.23.3...v0.23.4
runatlantis/atlantis