42atomys / stud42

Stud42 official repository since major 3 update (https://s42.app)
https://s42.app
MIT License
856 stars 27 forks source link

chore(deps): bump @sentry/nextjs from 7.74.1 to 7.84.0 in /web/ui #560

Closed dependabot[bot] closed 8 months ago

dependabot[bot] commented 8 months ago

Bumps @sentry/nextjs from 7.74.1 to 7.84.0.

Release notes

Sourced from @​sentry/nextjs's releases.

7.84.0

Important Changes

  • ref(nextjs): Set automaticVercelMonitors to be false by default (#9697)

From this version onwards the default for the automaticVercelMonitors option in the Next.js SDK is set to false. Previously, if you made use of Vercel Crons the SDK automatically instrumented the relevant routes to create Sentry monitors. Because this feature will soon be generally available, we are now flipping the default to avoid situations where quota is used unexpectedly.

If you want to continue using this feature, make sure to set the automaticVercelMonitors flag to true in your next.config.js Sentry settings.

Other Changes

  • chore(astro): Add 4.0.0 preview versions to astro peer dependency range (#9696)
  • feat(metrics): Add interfaces for metrics (#9698)
  • feat(web-vitals): Vendor in INP from web-vitals library (#9690)
  • fix(astro): Avoid adding the Sentry Vite plugin in dev mode (#9688)
  • fix(nextjs): Don't match files called middleware in node_modules (#9686)
  • fix(remix): Don't capture error responses that are not 5xx on Remix v2. (#9655)
  • fix(tracing): Don't attach resource size if null (#9669)
  • fix(utils): Regex match port to stop accidental replace (#9676)
  • fix(utils): Try catch new URL when extracting query params (#9675)

Bundle size πŸ“¦

Path Size
@​sentry/browser (incl. Tracing, Replay) - Webpack (gzipped) 65.86 KB
@​sentry/browser (incl. Tracing, Replay) - Webpack with treeshaking flags (gzipped) 59.46 KB
@​sentry/browser (incl. Tracing) - Webpack (gzipped) 31.12 KB
@​sentry/browser - Webpack (gzipped) 21.38 KB
@​sentry/browser (incl. Tracing, Replay) - ES6 CDN Bundle (gzipped) 62.72 KB
@​sentry/browser (incl. Tracing) - ES6 CDN Bundle (gzipped) 29.53 KB
@​sentry/browser - ES6 CDN Bundle (gzipped) 21.6 KB
@​sentry/browser (incl. Tracing, Replay) - ES6 CDN Bundle (minified & uncompressed) 197.46 KB
@​sentry/browser (incl. Tracing) - ES6 CDN Bundle (minified & uncompressed) 89.32 KB
@​sentry/browser - ES6 CDN Bundle (minified & uncompressed) 64.29 KB
@​sentry/browser (incl. Tracing) - ES5 CDN Bundle (gzipped) 32.22 KB
@​sentry/react (incl. Tracing, Replay) - Webpack (gzipped) 66.25 KB
@​sentry/react - Webpack (gzipped) 21.42 KB
@​sentry/nextjs Client (incl. Tracing, Replay) - Webpack (gzipped) 82.96 KB
@​sentry/nextjs Client - Webpack (gzipped) 48.21 KB
@​sentry-internal/feedback - Webpack (gzipped) 16.19 KB

7.83.0

  • chore(astro): Allow Astro 4.0 in peer dependencies (#9683)
  • feat(astro): Add assets option to source maps upload options (#9668)
  • feat(react): Support exactOptionalPropertyTypes on ErrorBoundary (#9098)
  • fix: Don't depend on browser types in types (#9682)
  • fix(astro): Configure sourcemap assets directory for Vercel adapter (#9665)

... (truncated)

Changelog

Sourced from @​sentry/nextjs's changelog.

7.84.0

Important Changes

  • ref(nextjs): Set automaticVercelMonitors to be false by default (#9697)

From this version onwards the default for the automaticVercelMonitors option in the Next.js SDK is set to false. Previously, if you made use of Vercel Crons the SDK automatically instrumented the relevant routes to create Sentry monitors. Because this feature will soon be generally available, we are now flipping the default to avoid situations where quota is used unexpectedly.

If you want to continue using this feature, make sure to set the automaticVercelMonitors flag to true in your next.config.js Sentry settings.

Other Changes

  • chore(astro): Add 4.0.0 preview versions to astro peer dependency range (#9696)
  • feat(metrics): Add interfaces for metrics (#9698)
  • feat(web-vitals): Vendor in INP from web-vitals library (#9690)
  • fix(astro): Avoid adding the Sentry Vite plugin in dev mode (#9688)
  • fix(nextjs): Don't match files called middleware in node_modules (#9686)
  • fix(remix): Don't capture error responses that are not 5xx on Remix v2. (#9655)
  • fix(tracing): Don't attach resource size if null (#9669)
  • fix(utils): Regex match port to stop accidental replace (#9676)
  • fix(utils): Try catch new URL when extracting query params (#9675)

7.83.0

  • chore(astro): Allow Astro 4.0 in peer dependencies (#9683)
  • feat(astro): Add assets option to source maps upload options (#9668)
  • feat(react): Support exactOptionalPropertyTypes on ErrorBoundary (#9098)
  • fix: Don't depend on browser types in types (#9682)
  • fix(astro): Configure sourcemap assets directory for Vercel adapter (#9665)
  • fix(remix): Check the error data before spreading. (#9664)

7.82.0

  • feat(astro): Automatically add Sentry middleware in Astro integration (#9532)
  • feat(core): Add optional setup hook to integrations (#9556)
  • feat(core): Add top level getClient() method (#9638)
  • feat(core): Allow to pass mechanism as event hint (#9590)
  • feat(core): Allow to use continueTrace without callback (#9615)
  • feat(feedback): Add onClose callback to showReportDialog (#9433) (#9550)
  • feat(nextjs): Add request data to all edge-capable functionalities (#9636)
  • feat(node): Add Spotlight option to Node SDK (#9629)
  • feat(utils): Refactor addInstrumentationHandler to dedicated methods (#9542)
  • fix: Make full url customizable for Spotlight (#9652)
  • fix(astro): Remove Auth Token existence check (#9651)
  • fix(nextjs): Fix middleware detection logic (#9637)
  • fix(remix): Skip capturing aborted requests (#9659)
  • fix(replay): Add BODY_PARSE_ERROR warning & time out fetch response load (#9622)
  • fix(tracing): Filter out invalid resource sizes (#9641)

... (truncated)

Commits
  • 4f4bd32 release: 7.84.0
  • 22960f5 Merge pull request #9705 from getsentry/prepare-release/7.84.0
  • e9e03e1 meta(changelog): Update changelog for 7.84.0
  • 59db749 feat(metrics): Add interfaces for metrics (#9698)
  • 27f6ae1 build: enable biome organizeImports feature (#9693)
  • 462ea44 ref(nextjs): Set automaticVercelMonitors to be false by default (#9697)
  • f500ac7 chore(astro): Add 4.0.0 preview versions to astro peer dependency range (#9...
  • 8c36659 build: add node.js v21 to test matrix (#9680)
  • 61e9056 feat(web-vitals): Vendor in INP from web-vitals library (#9690)
  • 28450ad fix(utils): Try catch new URL when extracting query params (#9675)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
github-actions[bot] commented 8 months ago

Terraform data for cluster stack

Terraform Initialization βš™οΈ success

Terraform Validation πŸ€– success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan πŸ“– success

Show Plan ``` kubernetes_service_account.promtail: Refreshing state... [id=monitoring/promtail] module.promtail.kubernetes_service.app[0]: Refreshing state... [id=monitoring/promtail] module.prometheus.kubernetes_service.app[0]: Refreshing state... [id=monitoring/prometheus] kubernetes_role.loki: Refreshing state... [id=monitoring/loki] module.loki.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/loki-data] module.prometheus.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/prometheus-config] module.grafana.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/grafana-data] kubernetes_cluster_role.promtail: Refreshing state... [id=promtail] module.tempo.kubernetes_service.app[0]: Refreshing state... [id=monitoring/tempo] module.promtail.kubernetes_daemonset.app[0]: Refreshing state... [id=monitoring/promtail] kubernetes_service_account.tempo: Refreshing state... [id=monitoring/tempo] module.tempo.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/tempo-config] kubernetes_service_account.prometheus: Refreshing state... [id=monitoring/prometheus] module.loki.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/loki-config] module.loki.kubernetes_service.app[0]: Refreshing state... [id=monitoring/loki] module.grafana.kubernetes_deployment.app[0]: Refreshing state... [id=monitoring/grafana] module.tempo.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/tempo-data] kubernetes_cluster_role.prometheus: Refreshing state... [id=prometheus] kubernetes_service_account.loki: Refreshing state... [id=monitoring/loki] module.grafana.kubernetes_service.app[0]: Refreshing state... [id=monitoring/grafana] module.promtail.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/promtail-config] module.prometheus.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/prometheus-data] module.cert_manager.null_resource.cert_manager_ovh_source: Refreshing state... [id=6901452211892208863] module.cert_manager.helm_release.cert_manager: Refreshing state... [id=cert-manager] module.monitoring_routing.kubectl_manifest.virtual_services["app-s42-dashboards"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/monitoring/virtualservices/app-s42-dashboards] module.istio.kubectl_manifest.gateways["app-s42"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/production/gateways/app-s42] module.istio.kubectl_manifest.gateways["app-s42-dashboards"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/monitoring/gateways/app-s42-dashboards] module.istio.kubectl_manifest.gateways["app-s42-next"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/staging/gateways/app-s42-next] module.istio.kubectl_manifest.gateways["dev-s42-previews"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/previews/gateways/dev-s42-previews] kubernetes_cluster_role_binding.promtail: Refreshing state... [id=promtail] module.prometheus.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/prometheus] module.tempo.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/tempo] module.loki.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/loki] kubernetes_cluster_role_binding.prometheus: Refreshing state... [id=prometheus] kubernetes_role_binding.loki: Refreshing state... [id=monitoring/loki] module.cert_manager.kubernetes_role.cert_manager_webhook_ovh_secret_reader: Refreshing state... [id=cert-manager/cert-manager-webhook-ovh:secret-reader] module.cert_manager.kubectl_manifest.certificates["app-s42"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42] module.cert_manager.kubectl_manifest.certificates["dev-s42-sandbox"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/dev-s42-sandbox] module.cert_manager.kubectl_manifest.certificates["app-s42-dashboards"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42-dashboards] module.cert_manager.kubectl_manifest.certificates["dev-s42-previews"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/dev-s42-previews] module.cert_manager.kubectl_manifest.certificates["app-s42-next"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42-next] module.cert_manager.kubernetes_role_binding.cert_manager_webhook_ovh_secret_reader: Refreshing state... [id=cert-manager/cert-manager-webhook-ovh:secret-reader] module.cert_manager.helm_release.cert_manager_ovh: Refreshing state... [id=cert-manager-webhook-ovh] module.secrets.kubernetes_manifest.sealed_secret["ghcr-creds"]: Refreshing state... module.secrets.kubernetes_manifest.sealed_secret["ovh-credentials"]: Refreshing state... module.cert_manager.kubectl_manifest.issuers["ovh-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/ovh-issuer] module.cert_manager.kubectl_manifest.self_signed_issuers["selfsigned-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/selfsigned-issuer] module.cert_manager.kubectl_manifest.issuers["ovh-staging-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/ovh-staging-issuer] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.istio.kubectl_manifest.gateways["app-s42-next"] will be created + resource "kubectl_manifest" "gateways" { + api_version = "networking.istio.io/v1alpha3" + apply_only = false + force_conflicts = false + force_new = false + id = (known after apply) + kind = "Gateway" + live_manifest_incluster = (sensitive value) + live_uid = (known after apply) + name = "app-s42-next" + namespace = "staging" + server_side_apply = false + uid = (known after apply) + validate_schema = true + wait_for_rollout = true + yaml_body = (sensitive value) + yaml_body_parsed = <<-EOT apiVersion: networking.istio.io/v1alpha3 kind: Gateway metadata: name: app-s42-next namespace: staging spec: selector: istio: ingressgateway servers: - hosts: - next.s42.app port: name: https number: 443 protocol: HTTPS tls: credentialName: app-s42-next-tls mode: SIMPLE - hosts: - next.s42.app port: name: http number: 80 protocol: HTTP tls: httpsRedirect: true EOT + yaml_incluster = (sensitive value) } Plan: 1 to add, 0 to change, 0 to destroy. Warning: "default_secret_name" is no longer applicable for Kubernetes v1.24.0 and above with kubernetes_service_account.prometheus, on monitoring.tf line 73, in resource "kubernetes_service_account" "prometheus": 73: resource "kubernetes_service_account" "prometheus" { Starting from version 1.24.0 Kubernetes does not automatically generate a token for service accounts, in this case, "default_secret_name" will be empty (and 3 more similar warnings elsewhere) ───────────────────────────────────────────────────────────────────────────── Saved the plan to: cluster-tfplan To perform exactly these actions, run the following command to apply: terraform apply "cluster-tfplan" ```
github-actions[bot] commented 8 months ago

Terraform data for pre-cluster stack

Terraform Initialization βš™οΈ success

Terraform Validation πŸ€– success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan πŸ“– success

Show Plan ``` helm_release.reflector: Refreshing state... [id=reflector] helm_release.rabbitmq_operator: Refreshing state... [id=primary] helm_release.istio_base: Refreshing state... [id=istio-base] helm_release.sealed_secret: Refreshing state... [id=sealed-secret] kubernetes_namespace.namespace["permission-manager"]: Refreshing state... [id=permission-manager] kubernetes_namespace.namespace["sandbox"]: Refreshing state... [id=sandbox] kubernetes_namespace.namespace["monitoring"]: Refreshing state... [id=monitoring] kubernetes_namespace.namespace["previews"]: Refreshing state... [id=previews] kubernetes_namespace.namespace["staging"]: Refreshing state... [id=staging] kubernetes_namespace.namespace["production"]: Refreshing state... [id=production] kubernetes_namespace.namespace["cert-manager"]: Refreshing state... [id=cert-manager] kubernetes_namespace.namespace["istio-system"]: Refreshing state... [id=istio-system] helm_release.istiod: Refreshing state... [id=istiod] helm_release.gateway: Refreshing state... [id=istio-ingressgateway] No changes. Your infrastructure matches the configuration. Terraform has compared your real infrastructure against your configuration and found no differences, so no changes are needed. ```
github-actions[bot] commented 8 months ago

Terraform data for apps stack

Terraform Initialization βš™οΈ success

Terraform Validation πŸ€– success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan πŸ“– success

Show Plan ``` module.s42.module.istio.kubectl_manifest.virtual_services["app-s42"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/production/virtualservices/app-s42] module.s42.module.postgres.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/postgres-data] module.s42.module.dragonfly.kubernetes_service.app[0]: Refreshing state... [id=production/dragonfly] module.webhooked.module.webhooked.kubernetes_service.app[0]: Refreshing state... [id=production/webhooked] module.s42.random_password.next_auth_secret: Refreshing state... [id=none] module.s42.random_password.postgres: Refreshing state... [id=none] module.s42.random_password.meilisearch_token: Refreshing state... [id=none] module.s42.module.crawler_campus.kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-campus] module.s42.module.meilisearch.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/meilisearch-data] module.s42.module.meilisearch_clean_tasks.kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/meilisearch-clean-tasks] module.s42.random_password.dragonfly: Refreshing state... [id=none] module.s42.module.api.kubernetes_deployment.app[0]: Refreshing state... [id=production/api] module.s42.module.interface.kubernetes_service.app[0]: Refreshing state... [id=production/interface] module.s42.module.interface.kubernetes_deployment.app[0]: Refreshing state... [id=production/interface] module.s42.module.dragonfly.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/dragonfly-data] module.webhooked.module.webhooked.kubernetes_config_map.app["config"]: Refreshing state... [id=production/webhooked-config] module.s42.module.api.kubernetes_service.app[0]: Refreshing state... [id=production/api] module.s42.module.auth_service.kubernetes_service.app[0]: Refreshing state... [id=production/auth-service] module.s42.module.postgres.kubernetes_config_map.app["config"]: Refreshing state... [id=production/postgres-config] module.s42.module.auth_service.kubernetes_deployment.app[0]: Refreshing state... [id=production/auth-service] module.s42.module.meilisearch.kubernetes_service.app[0]: Refreshing state... [id=production/meilisearch] module.s42.kubernetes_manifest.rabbitmq_policy_webhooks_dlq: Refreshing state... module.s42.kubernetes_manifest.rabbitmq_binding_webhooks_dlq: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["discord-token"]: Refreshing state... module.s42.kubernetes_manifest.rabbitmq: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["s42-service-token"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["ovh-s3-credentials"]: Refreshing state... module.s42.kubernetes_config_map.stud42_config: Refreshing state... [id=production/stud42-config] module.s42.module.service-token.kubernetes_manifest.sealed_secret["github-token"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["auth-service-certs-jwk"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["sentry-dsns"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["oauth2-providers"]: Refreshing state... module.s42.module.webhooks_processor.kubernetes_deployment.app[0]: Refreshing state... [id=production/webhooks-processor] module.s42.module.postgres.kubernetes_service.app[0]: Refreshing state... [id=production/postgres] module.s42.kubernetes_manifest.rabbitmq_queue_webhooks_dlq: Refreshing state... module.s42.module.crawler_locations["paris"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-paris] module.s42.kubernetes_secret.next_auth_secret: Refreshing state... [id=production/next-auth-secret] module.s42.module.crawler_locations["seoul"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-seoul] module.s42.module.crawler_locations["tokyo"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-tokyo] module.s42.kubernetes_manifest.rabbitmq_queue_webhooks_processing: Refreshing state... module.s42.module.crawler_locations["vienna"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-vienna] module.s42.module.crawler_locations["helsinki"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-helsinki] module.s42.module.crawler_locations["lausanne"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-lausanne] module.s42.module.crawler_locations["malaga"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-malaga] module.s42.module.crawler_locations["mulhouse"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-mulhouse] module.s42.module.dragonfly.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/dragonfly] module.s42.module.api.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/api] module.s42.module.interface.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/interface] module.s42.module.auth_service.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/auth-service] module.s42.module.meilisearch.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/meilisearch] module.s42.module.webhooks_processor.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/webhooks-processor] module.s42.module.postgres.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/postgres] module.s42.module.postgres.kubernetes_secret.app["credentials"]: Refreshing state... [id=production/postgres-credentials] module.s42.kubernetes_pod_disruption_budget_v1.rabbitmq: Refreshing state... [id=production/rabbitmq] module.s42.module.meilisearch.kubernetes_secret.app["token"]: Refreshing state... [id=production/meilisearch-token] module.s42.module.dragonfly.kubernetes_secret.app["credentials"]: Refreshing state... [id=production/dragonfly-credentials] module.s42.kubernetes_manifest.rabbitmq_exchange_webhooks: Refreshing state... module.webhooked.module.secrets.kubernetes_manifest.sealed_secret["s42-webhooked-secrets"]: Refreshing state... module.webhooked.module.webhooked.kubernetes_deployment.app[0]: Refreshing state... [id=production/webhooked] module.webhooked.module.webhooked.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/webhooked] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: ~ update in-place Terraform will perform the following actions: # module.s42.module.api.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/api" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "api" # (8 unchanged attributes hidden) # (24 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.api.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/api" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.api.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/api" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.auth_service.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/auth-service" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "auth-service" # (8 unchanged attributes hidden) # (8 unchanged blocks hidden) } # (4 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.auth_service.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/auth-service" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.auth_service.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/auth-service" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.crawler_campus.kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-campus" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-campus" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-campus" # (8 unchanged attributes hidden) # (12 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["helsinki"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-helsinki" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-helsinki" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-helsinki" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["lausanne"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-lausanne" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-lausanne" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-lausanne" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["malaga"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-malaga" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-malaga" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-malaga" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["mulhouse"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-mulhouse" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-mulhouse" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-mulhouse" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["paris"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-paris" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-paris" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-paris" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["seoul"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-seoul" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-seoul" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-seoul" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["tokyo"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-tokyo" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-tokyo" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-tokyo" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["vienna"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-vienna" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-vienna" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-vienna" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.interface.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/interface" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "interface" # (8 unchanged attributes hidden) # (32 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.interface.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/interface" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.interface.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/interface" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.webhooks_processor.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/webhooks-processor" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "webhooks-processor" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "webhooks-processor" # (8 unchanged attributes hidden) # (20 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.webhooks_processor.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/webhooks-processor" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "webhooks-processor" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } Plan: 0 to add, 20 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: apps-tfplan To perform exactly these actions, run the following command to apply: terraform apply "apps-tfplan" ```
dependabot[bot] commented 8 months ago

OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version. You can also ignore all major, minor, or patch releases for a dependency by adding an ignore condition with the desired update_types to your config file.

If you change your mind, just re-open this PR and I'll resolve any conflicts on it.

42atomys commented 8 months ago

Duplicate of #551