fix: Add DNS server configuration to all pipeline stages
All checks were successful
Code Quality & Security Scan / TFLint (push) Successful in 21s
Code Quality & Security Scan / Terraform Destroy (push) Has been skipped
Code Quality & Security Scan / Tfsec Security Scan (push) Successful in 26s
Code Quality & Security Scan / Checkov Security Scan (push) Successful in 39s
Code Quality & Security Scan / Terraform Validate (push) Successful in 39s
Code Quality & Security Scan / SonarQube Scan (push) Successful in 37s
Code Quality & Security Scan / Terraform Plan (push) Successful in 1m21s
Code Quality & Security Scan / Terraform Apply (push) Successful in 1m42s

Added TF_VAR_dns_servers to all pipeline stages to configure the
Renovate container to use internal DNS server for hostname resolution.

Changes:
- Added TF_VAR_dns_servers: '["192.168.2.2"]' to all pipeline env blocks
- Applied to: terraform-plan (init and plan)
- Applied to: terraform-apply (init and apply)
- Applied to: terraform-destroy (init, plan, execute)

This configures the Renovate container to use 192.168.2.2 as its DNS
server, allowing it to resolve internal hostnames like gitea.bsdserver.nl.

Fixes the ENOTFOUND DNS error:
  getaddrinfo ENOTFOUND gitea.bsdserver.nl

The DNS configuration is passed as a Terraform variable in JSON array
format: '["192.168.2.2"]'
This commit is contained in:
Patrick de Ruiter 2025-11-19 14:49:15 +01:00
parent 88f64911a7
commit 89f0029d67
Signed by: pderuiter
GPG Key ID: 5EBA7F21CF583321

View File

@ -154,6 +154,7 @@ jobs:
TF_BACKEND_REGION: "main" TF_BACKEND_REGION: "main"
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
TF_VAR_dns_servers: '["192.168.2.2"]'
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
VAULT_ADDR: ${{ secrets.VAULT_ADDR }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
@ -175,6 +176,7 @@ jobs:
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }} AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
TF_VAR_dns_servers: '["192.168.2.2"]'
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
VAULT_ADDR: ${{ secrets.VAULT_ADDR }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
@ -254,6 +256,7 @@ jobs:
TF_BACKEND_REGION: "main" TF_BACKEND_REGION: "main"
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
TF_VAR_dns_servers: '["192.168.2.2"]'
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
VAULT_ADDR: ${{ secrets.VAULT_ADDR }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
@ -287,6 +290,7 @@ jobs:
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }} AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
TF_VAR_dns_servers: '["192.168.2.2"]'
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
VAULT_ADDR: ${{ secrets.VAULT_ADDR }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
@ -350,6 +354,7 @@ jobs:
TF_BACKEND_REGION: "main" TF_BACKEND_REGION: "main"
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
TF_VAR_dns_servers: '["192.168.2.2"]'
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
VAULT_ADDR: ${{ secrets.VAULT_ADDR }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
@ -372,6 +377,7 @@ jobs:
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }} AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
TF_VAR_dns_servers: '["192.168.2.2"]'
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
VAULT_ADDR: ${{ secrets.VAULT_ADDR }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
@ -387,6 +393,7 @@ jobs:
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }} AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }} TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }} TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
TF_VAR_dns_servers: '["192.168.2.2"]'
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }} #TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }} #TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
VAULT_ADDR: ${{ secrets.VAULT_ADDR }} VAULT_ADDR: ${{ secrets.VAULT_ADDR }}