fix: Add DNS server configuration to all pipeline stages
All checks were successful
Code Quality & Security Scan / TFLint (push) Successful in 21s
Code Quality & Security Scan / Terraform Destroy (push) Has been skipped
Code Quality & Security Scan / Tfsec Security Scan (push) Successful in 26s
Code Quality & Security Scan / Checkov Security Scan (push) Successful in 39s
Code Quality & Security Scan / Terraform Validate (push) Successful in 39s
Code Quality & Security Scan / SonarQube Scan (push) Successful in 37s
Code Quality & Security Scan / Terraform Plan (push) Successful in 1m21s
Code Quality & Security Scan / Terraform Apply (push) Successful in 1m42s
All checks were successful
Code Quality & Security Scan / TFLint (push) Successful in 21s
Code Quality & Security Scan / Terraform Destroy (push) Has been skipped
Code Quality & Security Scan / Tfsec Security Scan (push) Successful in 26s
Code Quality & Security Scan / Checkov Security Scan (push) Successful in 39s
Code Quality & Security Scan / Terraform Validate (push) Successful in 39s
Code Quality & Security Scan / SonarQube Scan (push) Successful in 37s
Code Quality & Security Scan / Terraform Plan (push) Successful in 1m21s
Code Quality & Security Scan / Terraform Apply (push) Successful in 1m42s
Added TF_VAR_dns_servers to all pipeline stages to configure the Renovate container to use internal DNS server for hostname resolution. Changes: - Added TF_VAR_dns_servers: '["192.168.2.2"]' to all pipeline env blocks - Applied to: terraform-plan (init and plan) - Applied to: terraform-apply (init and apply) - Applied to: terraform-destroy (init, plan, execute) This configures the Renovate container to use 192.168.2.2 as its DNS server, allowing it to resolve internal hostnames like gitea.bsdserver.nl. Fixes the ENOTFOUND DNS error: getaddrinfo ENOTFOUND gitea.bsdserver.nl The DNS configuration is passed as a Terraform variable in JSON array format: '["192.168.2.2"]'
This commit is contained in:
parent
88f64911a7
commit
89f0029d67
@ -154,6 +154,7 @@ jobs:
|
|||||||
TF_BACKEND_REGION: "main"
|
TF_BACKEND_REGION: "main"
|
||||||
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
||||||
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
||||||
|
TF_VAR_dns_servers: '["192.168.2.2"]'
|
||||||
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
||||||
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
||||||
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
||||||
@ -175,6 +176,7 @@ jobs:
|
|||||||
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
|
||||||
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
||||||
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
||||||
|
TF_VAR_dns_servers: '["192.168.2.2"]'
|
||||||
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
||||||
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
||||||
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
||||||
@ -254,6 +256,7 @@ jobs:
|
|||||||
TF_BACKEND_REGION: "main"
|
TF_BACKEND_REGION: "main"
|
||||||
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
||||||
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
||||||
|
TF_VAR_dns_servers: '["192.168.2.2"]'
|
||||||
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
||||||
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
||||||
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
||||||
@ -287,6 +290,7 @@ jobs:
|
|||||||
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
|
||||||
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
||||||
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
||||||
|
TF_VAR_dns_servers: '["192.168.2.2"]'
|
||||||
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
||||||
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
||||||
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
||||||
@ -350,6 +354,7 @@ jobs:
|
|||||||
TF_BACKEND_REGION: "main"
|
TF_BACKEND_REGION: "main"
|
||||||
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
||||||
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
||||||
|
TF_VAR_dns_servers: '["192.168.2.2"]'
|
||||||
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
||||||
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
||||||
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
||||||
@ -372,6 +377,7 @@ jobs:
|
|||||||
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
|
||||||
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
||||||
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
||||||
|
TF_VAR_dns_servers: '["192.168.2.2"]'
|
||||||
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
||||||
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
||||||
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
||||||
@ -387,6 +393,7 @@ jobs:
|
|||||||
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
|
AWS_SECRET_ACCESS_KEY: ${{ secrets.MINIO_SECRET_KEY }}
|
||||||
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
TF_VAR_role_id: ${{ secrets.VAULT_ROLE_ID }}
|
||||||
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
TF_VAR_secret_id: ${{ secrets.VAULT_SECRET_ID }}
|
||||||
|
TF_VAR_dns_servers: '["192.168.2.2"]'
|
||||||
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
#TF_VAR_renovate_endpoint: ${{ secrets.RENOVATE_ENDPOINT }}
|
||||||
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
#TF_VAR_renovate_token: ${{ secrets.RENOVATE_TOKEN }}
|
||||||
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user