42atomys / stud42

Stud42 official repository since major 3 update (https://s42.app)
https://s42.app
MIT License
856 stars 27 forks source link

chore(deps): bump actions/stale from 8 to 9 #564

Closed dependabot[bot] closed 6 months ago

dependabot[bot] commented 7 months ago

Bumps actions/stale from 8 to 9.

Release notes

Sourced from actions/stale's releases.

v9.0.0

Breaking Changes

  1. Action is now stateful: If the action ends because of operations-per-run then the next run will start from the first unprocessed issue skipping the issues processed during the previous run(s). The state is reset when all the issues are processed. This should be considered for scheduling workflow runs.
  2. Version 9 of this action updated the runtime to Node.js 20. All scripts are now run with Node.js 20 instead of Node.js 16 and are affected by any breaking changes between Node.js 16 and 20.

What Else Changed

  1. Performance optimization that removes unnecessary API calls by @​dsame #1033 fixes #792
  2. Logs displaying current github API rate limit by @​dsame #1032 addresses #1029

For more information, please read the action documentation and its section about statefulness

New Contributors

Full Changelog: https://github.com/actions/stale/compare/v8...v9.0.0

Changelog

Sourced from actions/stale's changelog.

Changelog

[7.0.0]

:warning: Breaking change :warning:

[6.0.1]

Update @​actions/core to v1.10.0 (#839)

[6.0.0]

:warning: Breaking change :warning:

Issues/PRs default close-issue-reason is now not_planned(#789)

[5.1.0]

Don't process stale issues right after they're marked stale [Add close-issue-reason option]#764#772 Various dependabot/dependency updates

4.1.0 (2021-07-14)

Features

4.0.0 (2021-07-14)

Features

Bug Fixes

  • dry-run: forbid mutations in dry-run (#500) (f1017f3), closes #499
  • logs: coloured logs (#465) (5fbbfba)
  • operations: fail fast the current batch to respect the operations limit (#474) (5f6f311), closes #466
  • label comparison: make label comparison case insensitive #517, closes #516
  • filtering comments by actor could have strange behavior: "stale" comments are now detected based on if the message is the stale message not who made the comment(#519), fixes #441, #509, #518

Breaking Changes

... (truncated)

Commits
  • 28ca103 Upgrade Node to v20 (#1110)
  • b69b346 build(deps-dev): bump @​types/node from 18.16.18 to 20.5.1 (#1079)
  • 88a6f4f build(deps-dev): bump typescript from 5.1.3 to 5.2.2 (#1083)
  • 796531a Merge pull request #1080 from akv-platform/fix-delete-cache
  • 8986f62 Don not try to delete cache if it does not exists
  • cab99b3 fix typo proceeded/processed
  • 184e7af Merge pull request #1064 from actions/dependabot/npm_and_yarn/typescript-esli...
  • 523885c chore: update eslint-plugin, parser and eslint-plugin-jest
  • 2487a1d build(deps-dev): bump @​typescript-eslint/eslint-plugin
  • 60c722e Merge pull request #1063 from actions/dependabot/npm_and_yarn/jest-29.6.2
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
github-actions[bot] commented 7 months ago

Terraform data for pre-cluster stack

Terraform Initialization ⚙️ success

Terraform Validation 🤖 success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan 📖 success

Show Plan ``` kubernetes_namespace.namespace["istio-system"]: Refreshing state... [id=istio-system] kubernetes_namespace.namespace["staging"]: Refreshing state... [id=staging] kubernetes_namespace.namespace["permission-manager"]: Refreshing state... [id=permission-manager] kubernetes_namespace.namespace["monitoring"]: Refreshing state... [id=monitoring] kubernetes_namespace.namespace["sandbox"]: Refreshing state... [id=sandbox] kubernetes_namespace.namespace["production"]: Refreshing state... [id=production] kubernetes_namespace.namespace["previews"]: Refreshing state... [id=previews] kubernetes_namespace.namespace["cert-manager"]: Refreshing state... [id=cert-manager] helm_release.istio_base: Refreshing state... [id=istio-base] helm_release.rabbitmq_operator: Refreshing state... [id=primary] helm_release.reflector: Refreshing state... [id=reflector] helm_release.sealed_secret: Refreshing state... [id=sealed-secret] helm_release.istiod: Refreshing state... [id=istiod] helm_release.gateway: Refreshing state... [id=istio-ingressgateway] No changes. Your infrastructure matches the configuration. Terraform has compared your real infrastructure against your configuration and found no differences, so no changes are needed. ```
github-actions[bot] commented 7 months ago

Terraform data for cluster stack

Terraform Initialization ⚙️ success

Terraform Validation 🤖 success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan 📖 success

Show Plan ``` module.monitoring_routing.kubectl_manifest.virtual_services["app-s42-dashboards"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/monitoring/virtualservices/app-s42-dashboards] module.istio.kubectl_manifest.gateways["app-s42-dashboards"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/monitoring/gateways/app-s42-dashboards] module.istio.kubectl_manifest.gateways["app-s42"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/production/gateways/app-s42] module.istio.kubectl_manifest.gateways["app-s42-next"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/staging/gateways/app-s42-next] module.istio.kubectl_manifest.gateways["dev-s42-previews"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/previews/gateways/dev-s42-previews] module.cert_manager.null_resource.cert_manager_ovh_source: Refreshing state... [id=6901452211892208863] module.cert_manager.helm_release.cert_manager: Refreshing state... [id=cert-manager] module.promtail.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/promtail-config] module.promtail.kubernetes_daemonset.app[0]: Refreshing state... [id=monitoring/promtail] module.tempo.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/tempo-data] module.loki.kubernetes_service.app[0]: Refreshing state... [id=monitoring/loki] module.grafana.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/grafana-data] module.loki.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/loki-config] module.tempo.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/tempo-config] module.grafana.kubernetes_deployment.app[0]: Refreshing state... [id=monitoring/grafana] module.loki.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/loki-data] module.tempo.kubernetes_service.app[0]: Refreshing state... [id=monitoring/tempo] kubernetes_cluster_role.promtail: Refreshing state... [id=promtail] module.promtail.kubernetes_service.app[0]: Refreshing state... [id=monitoring/promtail] kubernetes_service_account.promtail: Refreshing state... [id=monitoring/promtail] kubernetes_cluster_role.prometheus: Refreshing state... [id=prometheus] module.grafana.kubernetes_service.app[0]: Refreshing state... [id=monitoring/grafana] kubernetes_service_account.tempo: Refreshing state... [id=monitoring/tempo] kubernetes_service_account.prometheus: Refreshing state... [id=monitoring/prometheus] module.prometheus.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=monitoring/prometheus-data] kubernetes_role.loki: Refreshing state... [id=monitoring/loki] module.prometheus.kubernetes_config_map.app["config"]: Refreshing state... [id=monitoring/prometheus-config] kubernetes_service_account.loki: Refreshing state... [id=monitoring/loki] module.cert_manager.kubernetes_role.cert_manager_webhook_ovh_secret_reader: Refreshing state... [id=cert-manager/cert-manager-webhook-ovh:secret-reader] module.prometheus.kubernetes_service.app[0]: Refreshing state... [id=monitoring/prometheus] module.cert_manager.kubectl_manifest.certificates["app-s42-next"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42-next] module.loki.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/loki] module.cert_manager.kubectl_manifest.certificates["dev-s42-sandbox"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/dev-s42-sandbox] module.cert_manager.kubectl_manifest.certificates["app-s42"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42] module.cert_manager.kubectl_manifest.certificates["app-s42-dashboards"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/app-s42-dashboards] module.cert_manager.kubectl_manifest.certificates["dev-s42-previews"]: Refreshing state... [id=/apis/cert-manager.io/v1/namespaces/istio-system/certificates/dev-s42-previews] kubernetes_cluster_role_binding.prometheus: Refreshing state... [id=prometheus] module.tempo.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/tempo] kubernetes_cluster_role_binding.promtail: Refreshing state... [id=promtail] kubernetes_role_binding.loki: Refreshing state... [id=monitoring/loki] module.prometheus.kubernetes_stateful_set.app[0]: Refreshing state... [id=monitoring/prometheus] module.cert_manager.kubernetes_role_binding.cert_manager_webhook_ovh_secret_reader: Refreshing state... [id=cert-manager/cert-manager-webhook-ovh:secret-reader] module.cert_manager.helm_release.cert_manager_ovh: Refreshing state... [id=cert-manager-webhook-ovh] module.secrets.kubernetes_manifest.sealed_secret["ovh-credentials"]: Refreshing state... module.secrets.kubernetes_manifest.sealed_secret["ghcr-creds"]: Refreshing state... module.cert_manager.kubectl_manifest.issuers["ovh-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/ovh-issuer] module.cert_manager.kubectl_manifest.issuers["ovh-staging-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/ovh-staging-issuer] module.cert_manager.kubectl_manifest.self_signed_issuers["selfsigned-issuer"]: Refreshing state... [id=/apis/cert-manager.io/v1/clusterissuers/selfsigned-issuer] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.istio.kubectl_manifest.gateways["app-s42-next"] will be created + resource "kubectl_manifest" "gateways" { + api_version = "networking.istio.io/v1alpha3" + apply_only = false + force_conflicts = false + force_new = false + id = (known after apply) + kind = "Gateway" + live_manifest_incluster = (sensitive value) + live_uid = (known after apply) + name = "app-s42-next" + namespace = "staging" + server_side_apply = false + uid = (known after apply) + validate_schema = true + wait_for_rollout = true + yaml_body = (sensitive value) + yaml_body_parsed = <<-EOT apiVersion: networking.istio.io/v1alpha3 kind: Gateway metadata: name: app-s42-next namespace: staging spec: selector: istio: ingressgateway servers: - hosts: - next.s42.app port: name: https number: 443 protocol: HTTPS tls: credentialName: app-s42-next-tls mode: SIMPLE - hosts: - next.s42.app port: name: http number: 80 protocol: HTTP tls: httpsRedirect: true EOT + yaml_incluster = (sensitive value) } Plan: 1 to add, 0 to change, 0 to destroy. Warning: "default_secret_name" is no longer applicable for Kubernetes v1.24.0 and above with kubernetes_service_account.prometheus, on monitoring.tf line 73, in resource "kubernetes_service_account" "prometheus": 73: resource "kubernetes_service_account" "prometheus" { Starting from version 1.24.0 Kubernetes does not automatically generate a token for service accounts, in this case, "default_secret_name" will be empty (and 3 more similar warnings elsewhere) ───────────────────────────────────────────────────────────────────────────── Saved the plan to: cluster-tfplan To perform exactly these actions, run the following command to apply: terraform apply "cluster-tfplan" ```
github-actions[bot] commented 7 months ago

Terraform data for apps stack

Terraform Initialization ⚙️ success

Terraform Validation 🤖 success

Show Validation ``` Success! The configuration is valid. ```

Terraform Plan 📖 success

Show Plan ``` module.s42.module.istio.kubectl_manifest.virtual_services["app-s42"]: Refreshing state... [id=/apis/networking.istio.io/v1alpha3/namespaces/production/virtualservices/app-s42] module.s42.random_password.dragonfly: Refreshing state... [id=none] module.s42.random_password.postgres: Refreshing state... [id=none] module.s42.module.meilisearch.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/meilisearch-data] module.s42.random_password.next_auth_secret: Refreshing state... [id=none] module.s42.random_password.meilisearch_token: Refreshing state... [id=none] module.s42.module.dragonfly.kubernetes_service.app[0]: Refreshing state... [id=production/dragonfly] module.s42.module.api.kubernetes_service.app[0]: Refreshing state... [id=production/api] module.s42.kubernetes_config_map.stud42_config: Refreshing state... [id=production/stud42-config] module.s42.module.postgres.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/postgres-data] module.s42.module.meilisearch.kubernetes_service.app[0]: Refreshing state... [id=production/meilisearch] module.s42.module.crawler_campus.kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-campus] module.s42.module.dragonfly.kubernetes_persistent_volume_claim.app["data"]: Refreshing state... [id=production/dragonfly-data] module.s42.module.postgres.kubernetes_config_map.app["config"]: Refreshing state... [id=production/postgres-config] module.s42.module.interface.kubernetes_service.app[0]: Refreshing state... [id=production/interface] module.s42.module.interface.kubernetes_deployment.app[0]: Refreshing state... [id=production/interface] module.s42.module.auth_service.kubernetes_deployment.app[0]: Refreshing state... [id=production/auth-service] module.s42.module.api.kubernetes_deployment.app[0]: Refreshing state... [id=production/api] module.s42.module.crawler_locations["helsinki"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-helsinki] module.s42.module.postgres.kubernetes_service.app[0]: Refreshing state... [id=production/postgres] module.s42.module.crawler_locations["lausanne"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-lausanne] module.s42.module.crawler_locations["malaga"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-malaga] module.s42.module.crawler_locations["mulhouse"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-mulhouse] module.s42.module.crawler_locations["paris"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-paris] module.s42.module.crawler_locations["seoul"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-seoul] module.s42.module.crawler_locations["tokyo"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-tokyo] module.s42.module.crawler_locations["vienna"].kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/crawler-locations-vienna] module.webhooked.module.webhooked.kubernetes_service.app[0]: Refreshing state... [id=production/webhooked] module.s42.kubernetes_manifest.rabbitmq_queue_webhooks_processing: Refreshing state... module.s42.module.auth_service.kubernetes_service.app[0]: Refreshing state... [id=production/auth-service] module.webhooked.module.webhooked.kubernetes_config_map.app["config"]: Refreshing state... [id=production/webhooked-config] module.s42.module.webhooks_processor.kubernetes_deployment.app[0]: Refreshing state... [id=production/webhooks-processor] module.s42.kubernetes_manifest.rabbitmq_queue_webhooks_dlq: Refreshing state... module.s42.module.meilisearch_clean_tasks.kubernetes_cron_job_v1.app[0]: Refreshing state... [id=production/meilisearch-clean-tasks] module.s42.kubernetes_secret.next_auth_secret: Refreshing state... [id=production/next-auth-secret] module.s42.kubernetes_manifest.rabbitmq_policy_webhooks_dlq: Refreshing state... module.s42.kubernetes_manifest.rabbitmq_binding_webhooks_dlq: Refreshing state... module.s42.kubernetes_manifest.rabbitmq: Refreshing state... module.webhooked.module.secrets.kubernetes_manifest.sealed_secret["s42-webhooked-secrets"]: Refreshing state... module.s42.module.dragonfly.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/dragonfly] module.s42.module.meilisearch.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/meilisearch] module.s42.module.interface.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/interface] module.s42.module.auth_service.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/auth-service] module.s42.module.api.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/api] module.s42.module.postgres.kubernetes_stateful_set.app[0]: Refreshing state... [id=production/postgres] module.s42.module.meilisearch.kubernetes_secret.app["token"]: Refreshing state... [id=production/meilisearch-token] module.s42.module.dragonfly.kubernetes_secret.app["credentials"]: Refreshing state... [id=production/dragonfly-credentials] module.s42.module.postgres.kubernetes_secret.app["credentials"]: Refreshing state... [id=production/postgres-credentials] module.s42.module.webhooks_processor.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/webhooks-processor] module.s42.kubernetes_pod_disruption_budget_v1.rabbitmq: Refreshing state... [id=production/rabbitmq] module.webhooked.module.webhooked.kubernetes_deployment.app[0]: Refreshing state... [id=production/webhooked] module.s42.kubernetes_manifest.rabbitmq_exchange_webhooks: Refreshing state... module.webhooked.module.webhooked.kubernetes_horizontal_pod_autoscaler_v2.app[0]: Refreshing state... [id=production/webhooked] module.s42.module.service-token.kubernetes_manifest.sealed_secret["sentry-dsns"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["s42-service-token"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["auth-service-certs-jwk"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["github-token"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["ovh-s3-credentials"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["discord-token"]: Refreshing state... module.s42.module.service-token.kubernetes_manifest.sealed_secret["oauth2-providers"]: Refreshing state... Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: ~ update in-place Terraform will perform the following actions: # module.s42.module.api.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/api" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "api" # (8 unchanged attributes hidden) # (24 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.api.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/api" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.api.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/api" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "api" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.auth_service.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/auth-service" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "auth-service" # (8 unchanged attributes hidden) # (8 unchanged blocks hidden) } # (4 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.auth_service.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/auth-service" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.auth_service.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/auth-service" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "auth-service" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.crawler_campus.kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-campus" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-campus" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-campus" # (8 unchanged attributes hidden) # (12 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["helsinki"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-helsinki" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-helsinki" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-helsinki" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["lausanne"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-lausanne" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-lausanne" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-lausanne" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["malaga"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-malaga" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-malaga" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-malaga" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["mulhouse"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-mulhouse" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-mulhouse" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-mulhouse" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["paris"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-paris" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-paris" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-paris" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["seoul"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-seoul" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-seoul" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-seoul" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["tokyo"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-tokyo" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-tokyo" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-tokyo" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.crawler_locations["vienna"].kubernetes_cron_job_v1.app[0] will be updated in-place ~ resource "kubernetes_cron_job_v1" "app" { id = "production/crawler-locations-vienna" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "crawler-locations-vienna" # (5 unchanged attributes hidden) } ~ spec { # (6 unchanged attributes hidden) ~ job_template { ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (7 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "crawler-locations-vienna" # (8 unchanged attributes hidden) # (14 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } } } } } # module.s42.module.interface.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/interface" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (4 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "interface" # (8 unchanged attributes hidden) # (32 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.interface.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/interface" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.interface.kubernetes_service.app[0] will be updated in-place ~ resource "kubernetes_service" "app" { id = "production/interface" # (2 unchanged attributes hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "interface" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } # module.s42.module.webhooks_processor.kubernetes_deployment.app[0] will be updated in-place ~ resource "kubernetes_deployment" "app" { id = "production/webhooks-processor" # (1 unchanged attribute hidden) ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "webhooks-processor" # (5 unchanged attributes hidden) } ~ spec { # (5 unchanged attributes hidden) ~ template { ~ metadata { ~ labels = { ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } # (2 unchanged attributes hidden) } ~ spec { # (12 unchanged attributes hidden) ~ container { ~ image = "ghcr.io/42atomys/stud42:v0.31.1" -> "ghcr.io/42atomys/stud42:latest" name = "webhooks-processor" # (8 unchanged attributes hidden) # (20 unchanged blocks hidden) } # (3 unchanged blocks hidden) } } # (2 unchanged blocks hidden) } } # module.s42.module.webhooks_processor.kubernetes_horizontal_pod_autoscaler_v2.app[0] will be updated in-place ~ resource "kubernetes_horizontal_pod_autoscaler_v2" "app" { id = "production/webhooks-processor" ~ metadata { ~ labels = { ~ "app.kubernetes.io/version" = "v0.31.1" -> "latest" ~ "version" = "v0.31.1" -> "latest" # (5 unchanged elements hidden) } name = "webhooks-processor" # (5 unchanged attributes hidden) } # (1 unchanged block hidden) } Plan: 0 to add, 20 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: apps-tfplan To perform exactly these actions, run the following command to apply: terraform apply "apps-tfplan" ```