Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Apr 5, 2023

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
ethers (source) 5.4.7 -> 5.7.2 age adoption passing confidence

Release Notes

ethers-io/ethers.js

v5.7.2: ethers/v5.7.2 (2022-10-19 04:19)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-Htz1SE4Sl5aitpvFgr2j0sfsGUIuSXI6t8hEyrlQ93zflEF3a29bH2AvkUROUw7J"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.7.2.umd.min.js">
</script>

v5.7.1: ethers/v5.7.1 (2022-09-13 21:28)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-RG8QV/8Pwe52alIcSWxFpA7GbD1/mIxUAQA5PeEDh5EnTyJiWhIvYfw5RYBIz8DQ"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.7.1.umd.min.js">
</script>

v5.7.0: ethers/v5.7.0 (2022-08-18 16:17)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-EQi5ynMqKKWGuwfjllsutXzvDo0ubfkYMhKrz5WJJB7PUXnkSo5qxWSy80hu/Zh9"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.7.0.umd.min.js">
</script>

v5.6.9: ethers/v5.6.9 (2022-06-17 14:44)

Compare Source

  • Removed Ankr for Ropsten default provider; the merge seems to have broke it. (3790671)
  • Fix NonceManager for increment 0 and provided nonce. (#​3062, #​3085; 0a28679)
  • Fixed topic filters for numeric types with string values. (#​3013; 0078e02)

Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-qU3nvpskWirnJuSLmQWFfAFKbiN5+JKbAEEoTOcPYJu3s1xCe66b66sUER3x5wVF"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.9.umd.min.js">
</script>

v5.6.8: ethers/v5.6.8 (2022-05-24 11:50)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-HylgU+iVrVfHivfdkJGhzBJmBxfXLECLZzB2HEiL6bU7GwQH+Xnf/lEDZpNbWs9C"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.8.umd.min.js">
</script>

v5.6.7: ethers/v5.6.7 (2022-05-20 19:11)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-YUSWh0CQ0Ck2wXgObj8tXJeOqe0QLhmeONEcw5N3OIBknCB4kZxHB5pHvhrLRSFB"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.7.umd.min.js">
</script>

v5.6.6: ethers/v5.6.6 (2022-05-12 17:29)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-aYbelA/Ptk4xbBWv+CrZGR4bFtfdsUgXeWNCIKloTT769EAtwGS81FYbgbnbRP3r"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.6.umd.min.js">
</script>

v5.6.5: ethers/v5.6.5 (2022-05-01 02:10)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-HDtKXW/WGUPp3+NyVJAJ7Uocm4RHhHnupa1pgV6m+G8JSFlL5wCphMFvwkPhdaTo"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.5.umd.min.js">
</script>

v5.6.4: ethers/v5.6.4 (2022-04-13 16:56)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-Y3akzp1SirJeIbvoXIqJpwsCXex0qqH9sYkn3YBk5V+eFg6UjDOL3+SuzFDBoehq"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.4.umd.min.js">
</script>

v5.6.3: ethers/v5.6.3 (2022-04-13 00:23)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-FdKjh3/99hRuPi1kjKQCoVDxcqDyadFCzn+0eGRqlRDfCfu34dUIvARvD1GetdRk"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.3.umd.min.js">
</script>

v5.6.2: ethers/v5.6.2 (2022-03-25 17:56)

Compare Source

  • Fixed left-padding in arrayify. (#​2833; e192903)
  • More robust JSON-RPC error handling for reverted executions. (#​2603; 9d9b14b)
  • Added IPNS support for ENS contenthash. (e70f3fe)
  • Added initial AnkrProvider (96de581)

Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-qs2vsqAFA8HemUN26W9rQk9FbPhRSx8Nom/DUpdKIyoiRhE5KX9hPgWhX5X4baBB"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.2.umd.min.js">
</script>

v5.6.1: ethers/v5.6.1 (2022-03-16 01:25)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-gpTMxPzzvJTTqvtQYTKNpUG2OF+R5E8zdloHZvHIh+fw0lwlsStx33A86eG4WKve"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.1.umd.min.js">
</script>

v5.6.0: ethers/v5.6.0 (2022-03-09 14:57)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-9yTnv56yzVfnTq5ivTdc/x0dgp+W1JPRborbGbrr8lAvXBP/W83A08rvYb2hIs6O"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.6.0.umd.min.js">
</script>

v5.5.4: ethers/v5.5.4 (2022-01-24 16:45)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-Jk2KQmxNIrlZNY8bE1bEnOjnx9PkvpwWgH/MEBCK+gpks+KdtHLnr2RzmMseDrGh"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.5.4.umd.min.js">
</script>

v5.5.3: ethers/v5.5.3 (2022-01-06 03:52)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-9YjKsdXMXrDGpJr2BHBh4/Ho+T0N760c/6CNf9rTk8PVPu51rpSgiQONc8II24HF"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.5.3.umd.min.js">
</script>

v5.5.2: ethers/v5.5.2 (2021-11-30 19:16)

Compare Source

  • Fixed test case for getAvatar; url has moved (617714d)
  • Added basic redirect support. (42784b8)
  • Added arbitrum and optimism to networks and providers. (#​2335; 0844de4)
  • Added support for data URLs for avatar metadata. (b8391b0)
  • Fixed getAvatar for unconfigured ENS names. (1e1c93e)

Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-nSPKJoI2xuw1LI9bDU45beoc7mnZtae7zmXYuchecL92MMNqHsTzQAX/xSVP6YMV"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.5.2.umd.min.js">
</script>

v5.5.1: ethers/v5.5.1 (2021-10-20 03:59)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-TOrQOibRJLhwxzAdxn9pLj7Kx8mTIBrNfq6jSOiHrB519TUbe3z/d79TTvE0Pv6d"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.5.1.umd.min.js">
</script>

v5.5.0: ethers/v5.5.0 (2021-10-19 00:01)

Compare Source


Embedding UMD with SRI:

<script type="text/javascript"
        integrity="sha384-B0/+vAZvVIFYnN5Jy/sN0OJZd7ai9oCi69Xw8kjMkRDDHPoQpGMYOwcN+fp8OLSw"
        crossorigin="anonymous"
        src="https://cdn-cors.ethers.io/lib/ethers-5.5.0.umd.min.js">
</script>

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot requested a review from elijaholmos as a code owner April 5, 2023 21:02
@renovate renovate bot added the dependencies label Apr 5, 2023
@renovate renovate bot force-pushed the renovate/ethers-5.x branch 2 times, most recently from a04b4c1 to 31df368 Compare April 6, 2023 02:08
@renovate renovate bot force-pushed the renovate/ethers-5.x branch 5 times, most recently from d7ae4c8 to 2bbcebc Compare April 20, 2023 01:35
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in Terraform Cloud. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

To view this run in a browser, visit:
https://app.terraform.io/app/CrimLog/dev/runs/run-ZS8SpWsHWxuCb8Tz

Waiting for the plan to start...

Terraform v1.4.5
on linux_amd64
Initializing plugins and modules...
aws_iam_role.ecs_task_execution_role: Refreshing state... [id=graphql-api-dev-execution-role]
aws_vpc.vpc: Refreshing state... [id=vpc-071c87c56b8eca1be]
aws_iam_policy.fargate_policy: Refreshing state... [id=arn:aws:iam::479401498383:policy/graphql-api-dev-fargate-policy]
data.aws_acm_certificate.cert: Refreshing...
aws_default_vpc.vpc: Refreshing state... [id=vpc-04a957e07df5e4290]
aws_cloudwatch_log_group.log_group: Refreshing state... [id=/ecs/graphql-api-dev]
aws_ecs_cluster.cluster: Refreshing state... [id=arn:aws:ecs:us-east-1:479401498383:cluster/graphql-api-dev]
aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment2: Refreshing state... [id=graphql-api-dev-execution-role-20230419232626332000000001]
aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment1: Refreshing state... [id=graphql-api-dev-execution-role-20230419232626349200000002]
aws_ecs_task_definition.definition: Refreshing state... [id=graphql-api-dev-task]
data.aws_acm_certificate.cert: Refresh complete after 1s [id=arn:aws:acm:us-east-1:479401498383:certificate/71f48b3d-ceca-4b5f-bcb9-4b8055d23758]
aws_default_security_group.default: Refreshing state... [id=sg-0fa73ffe645781826]
aws_subnet.subnet["us-east-1b"]: Refreshing state... [id=subnet-070be33c50d6962da]
aws_subnet.subnet["us-east-1d"]: Refreshing state... [id=subnet-0cbd4d58eb64dbcb2]
aws_internet_gateway.gw: Refreshing state... [id=igw-0ce407fc154b8cb2c]
aws_lb_target_group.target_group: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:479401498383:targetgroup/graphql-api-dev/5347bfb4422bb66c]
aws_vpc_peering_connection.peering_connection: Refreshing state... [id=pcx-093ce57d2df3df5dd]
aws_security_group.web_everyone2: Refreshing state... [id=sg-09d11e5205916ea28]
aws_security_group.graphql_api: Refreshing state... [id=sg-091e4a09d3a5eaeec]
aws_route.vpc_peering_route: Refreshing state... [id=r-rtb-023d93e86e836cb4b2811395018]
aws_default_route_table.default: Refreshing state... [id=rtb-0a657c4a4dd0540c7]
aws_lb.alb: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:479401498383:loadbalancer/app/graphql-api-dev-alb/b6f57001c89afb4a]
aws_ecs_service.service: Refreshing state... [id=arn:aws:ecs:us-east-1:479401498383:service/graphql-api-dev/graphql-api-dev-svc]
aws_lb_listener.listener: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:479401498383:listener/app/graphql-api-dev-alb/b6f57001c89afb4a/9d6cbfda849869bc]
aws_ecs_task_definition.definition: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_ecs_service.service will be updated in-place
  ~ resource "aws_ecs_service" "service" {
        id                                 = "arn:aws:ecs:us-east-1:479401498383:service/graphql-api-dev/graphql-api-dev-svc"
        name                               = "graphql-api-dev-svc"
        tags                               = {}
      ~ task_definition                    = "arn:aws:ecs:us-east-1:479401498383:task-definition/graphql-api-dev-task:2" -> (known after apply)
        # (15 unchanged attributes hidden)

        # (4 unchanged blocks hidden)
    }

  # aws_ecs_task_definition.definition must be replaced
-/+ resource "aws_ecs_task_definition" "definition" {
      ~ arn                      = "arn:aws:ecs:us-east-1:479401498383:task-definition/graphql-api-dev-task:2" -> (known after apply)
      ~ arn_without_revision     = "arn:aws:ecs:us-east-1:479401498383:task-definition/graphql-api-dev-task" -> (known after apply)
      ~ container_definitions    = jsonencode(
          ~ [
              ~ {
                  ~ image            = "479401498383.dkr.ecr.us-east-1.amazonaws.com/graphql-api:7666a1ec2efb24db3a2e09a983dd5ae6ad121646" -> "479401498383.dkr.ecr.us-east-1.amazonaws.com/graphql-api:cc6b99308031363eaa10121071606199a69ec2cb"
                    name             = "graphql-api-dev-container"
                    # (8 unchanged attributes hidden)
                },
            ] # forces replacement
        )
      ~ id                       = "graphql-api-dev-task" -> (known after apply)
      ~ revision                 = 2 -> (known after apply)
      - tags                     = {} -> null
      ~ tags_all                 = {} -> (known after apply)
        # (7 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

Plan: 1 to add, 1 to change, 1 to destroy.

Pushed by: @renovate[bot], Action: pull_request, Environment: dev

@renovate renovate bot force-pushed the renovate/ethers-5.x branch from 2bbcebc to 42e5070 Compare April 20, 2023 18:08
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in Terraform Cloud. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

To view this run in a browser, visit:
https://app.terraform.io/app/CrimLog/dev/runs/run-JigtX4NixmoXCoSN

Waiting for the plan to start...

Terraform v1.4.5
on linux_amd64
Initializing plugins and modules...
aws_cloudwatch_log_group.log_group: Refreshing state... [id=/ecs/graphql-api-test]
data.aws_acm_certificate.cert: Refreshing...
aws_iam_policy.fargate_policy: Refreshing state... [id=arn:aws:iam::043894507808:policy/graphql-api-test-fargate-policy]
aws_iam_role.ecs_task_execution_role: Refreshing state... [id=graphql-api-test-execution-role]
aws_default_vpc.vpc: Refreshing state... [id=vpc-05493280cd154e867]
aws_ecs_cluster.cluster: Refreshing state... [id=arn:aws:ecs:us-east-1:043894507808:cluster/graphql-api-test]
aws_vpc.vpc: Refreshing state... [id=vpc-0ee6fa0c508a5ca80]
aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment1: Refreshing state... [id=graphql-api-test-execution-role-20230420170658980700000002]
aws_ecs_task_definition.definition: Refreshing state... [id=graphql-api-test-task]
aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment2: Refreshing state... [id=graphql-api-test-execution-role-20230420170658951000000001]
data.aws_acm_certificate.cert: Refresh complete after 1s [id=arn:aws:acm:us-east-1:043894507808:certificate/bf306bea-c739-451e-bc54-bfd24909b37c]
aws_internet_gateway.gw: Refreshing state... [id=igw-03b3f72ff588c7b80]
aws_iam_policy.fargate_policy: Drift detected (update)
aws_ecs_task_definition.definition: Drift detected (update)
aws_iam_role.ecs_task_execution_role: Drift detected (update)
aws_cloudwatch_log_group.log_group: Drift detected (update)
aws_ecs_cluster.cluster: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_cloudwatch_log_group.log_group must be replaced
-/+ resource "aws_cloudwatch_log_group" "log_group" {
      ~ arn               = "arn:aws:logs:us-east-1:043894507808:log-group:/ecs/graphql-api-test" -> (known after apply)
      ~ id                = "/ecs/graphql-api-test" -> (known after apply)
      ~ name              = "/ecs/graphql-api-test" -> "/ecs/graphql-api-dev" # forces replacement
      + name_prefix       = (known after apply)
      - tags              = {} -> null
      ~ tags_all          = {} -> (known after apply)
        # (2 unchanged attributes hidden)
    }

  # aws_default_route_table.default will be created
  + resource "aws_default_route_table" "default" {
      + arn                    = (known after apply)
      + default_route_table_id = "rtb-02f716fd76bdb9cf4"
      + id                     = (known after apply)
      + owner_id               = (known after apply)
      + route                  = [
          + {
              + cidr_block                 = "0.0.0.0/0"
              + core_network_arn           = ""
              + destination_prefix_list_id = ""
              + egress_only_gateway_id     = ""
              + gateway_id                 = "igw-03b3f72ff588c7b80"
              + instance_id                = ""
              + ipv6_cidr_block            = ""
              + nat_gateway_id             = ""
              + network_interface_id       = ""
              + transit_gateway_id         = ""
              + vpc_endpoint_id            = ""
              + vpc_peering_connection_id  = ""
            },
          + {
              + cidr_block                 = "172.31.0.0/16"
              + core_network_arn           = ""
              + destination_prefix_list_id = ""
              + egress_only_gateway_id     = ""
              + gateway_id                 = ""
              + instance_id                = ""
              + ipv6_cidr_block            = ""
              + nat_gateway_id             = ""
              + network_interface_id       = ""
              + transit_gateway_id         = ""
              + vpc_endpoint_id            = ""
              + vpc_peering_connection_id  = (known after apply)
            },
        ]
      + tags_all               = (known after apply)
      + vpc_id                 = (known after apply)
    }

  # aws_default_security_group.default will be created
  + resource "aws_default_security_group" "default" {
      + arn                    = (known after apply)
      + description            = (known after apply)
      + egress                 = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 0
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "-1"
              + security_groups  = []
              + self             = false
              + to_port          = 0
            },
        ]
      + id                     = (known after apply)
      + ingress                = [
          + {
              + cidr_blocks      = [
                  + "172.33.0.0/16",
                ]
              + description      = "Default graphql-api-dev VPC"
              + from_port        = 5432
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 5432
            },
        ]
      + name                   = (known after apply)
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags                   = {
          + "Name" = "RDS-Postgres graphql-api-dev"
        }
      + tags_all               = {
          + "Name" = "RDS-Postgres graphql-api-dev"
        }
      + vpc_id                 = "vpc-0ee6fa0c508a5ca80"
    }

  # aws_ecs_cluster.cluster must be replaced
-/+ resource "aws_ecs_cluster" "cluster" {
      ~ arn                = "arn:aws:ecs:us-east-1:043894507808:cluster/graphql-api-test" -> (known after apply)
      ~ capacity_providers = [] -> (known after apply)
      ~ id                 = "arn:aws:ecs:us-east-1:043894507808:cluster/graphql-api-test" -> (known after apply)
      ~ name               = "graphql-api-test" -> "graphql-api-dev" # forces replacement
      - tags               = {} -> null
      ~ tags_all           = {} -> (known after apply)

        # (1 unchanged block hidden)
    }

  # aws_ecs_service.service will be created
  + resource "aws_ecs_service" "service" {
      + cluster                            = (known after apply)
      + deployment_maximum_percent         = 200
      + deployment_minimum_healthy_percent = 100
      + desired_count                      = 1
      + enable_ecs_managed_tags            = true
      + enable_execute_command             = false
      + health_check_grace_period_seconds  = 0
      + iam_role                           = (known after apply)
      + id                                 = (known after apply)
      + launch_type                        = "FARGATE"
      + name                               = "graphql-api-dev-svc"
      + platform_version                   = "LATEST"
      + propagate_tags                     = "NONE"
      + scheduling_strategy                = "REPLICA"
      + tags_all                           = (known after apply)
      + task_definition                    = (known after apply)
      + triggers                           = (known after apply)
      + wait_for_steady_state              = false

      + deployment_circuit_breaker {
          + enable   = false
          + rollback = false
        }

      + deployment_controller {
          + type = "ECS"
        }

      + load_balancer {
          + container_name   = "graphql-api-dev-container"
          + container_port   = 80
          + target_group_arn = (known after apply)
        }

      + network_configuration {
          + assign_public_ip = true
          + security_groups  = (known after apply)
          + subnets          = (known after apply)
        }
    }

  # aws_ecs_task_definition.definition must be replaced
-/+ resource "aws_ecs_task_definition" "definition" {
      ~ arn                      = "arn:aws:ecs:us-east-1:043894507808:task-definition/graphql-api-test-task:1" -> (known after apply)
      ~ arn_without_revision     = "arn:aws:ecs:us-east-1:043894507808:task-definition/graphql-api-test-task" -> (known after apply)
      ~ container_definitions    = jsonencode(
          ~ [
              ~ {
                  ~ environment      = [
                      ~ {
                            name  = "NODE_ENV"
                          ~ value = "test" -> "dev"
                        },
                        {
                            name  = "PORT"
                            value = "80"
                        },
                    ]
                  ~ image            = "043894507808.dkr.ecr.us-east-1.amazonaws.com/graphql-api:latest" -> "043894507808.dkr.ecr.us-east-1.amazonaws.com/graphql-api:fc462dea8e3d0040a3785699f5bfc304fe05d597"
                  ~ logConfiguration = {
                      ~ options   = {
                          ~ awslogs-group         = "/ecs/graphql-api-test" -> "/ecs/graphql-api-dev"
                            # (2 unchanged attributes hidden)
                        }
                        # (1 unchanged attribute hidden)
                    }
                  ~ name             = "graphql-api-test-container" -> "graphql-api-dev-container"
                  ~ secrets          = [
                      ~ {
                            name      = "JWT_SECRET"
                          ~ valueFrom = "arn:aws:secretsmanager:us-east-1:479401498383:secret:graphql-api-secrets-46UvoX:JWT_SECRET::" -> "arn:aws:secretsmanager:us-east-1:043894507808:secret:graphql-api-secrets-ajTuEN:JWT_SECRET::"
                        },
                      ~ {
                            name      = "DATABASE_URL"
                          ~ valueFrom = "arn:aws:secretsmanager:us-east-1:479401498383:secret:graphql-api-secrets-46UvoX:DATABASE_URL::" -> "arn:aws:secretsmanager:us-east-1:043894507808:secret:graphql-api-secrets-ajTuEN:DATABASE_URL::"
                        },
                      ~ {
                            name      = "ALCHEMY_API_KEY"
                          ~ valueFrom = "arn:aws:secretsmanager:us-east-1:479401498383:secret:graphql-api-secrets-46UvoX:ALCHEMY_API_KEY::" -> "arn:aws:secretsmanager:us-east-1:043894507808:secret:graphql-api-secrets-ajTuEN:ALCHEMY_API_KEY::"
                        },
                      ~ {
                            name      = "MATIC_PRIVATE_KEY"
                          ~ valueFrom = "arn:aws:secretsmanager:us-east-1:479401498383:secret:graphql-api-secrets-46UvoX:MATIC_PRIVATE_KEY::" -> "arn:aws:secretsmanager:us-east-1:043894507808:secret:graphql-api-secrets-ajTuEN:MATIC_PRIVATE_KEY::"
                        },
                    ]
                    # (5 unchanged attributes hidden)
                },
            ] # forces replacement
        )
      ~ execution_role_arn       = "arn:aws:iam::043894507808:role/graphql-api-test-execution-role" # forces replacement -> (known after apply)
      ~ family                   = "graphql-api-test-task" -> "graphql-api-dev-task" # forces replacement
      ~ id                       = "graphql-api-test-task" -> (known after apply)
      ~ revision                 = 1 -> (known after apply)
      - tags                     = {} -> null
      ~ tags_all                 = {} -> (known after apply)
        # (5 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

  # aws_iam_policy.fargate_policy must be replaced
-/+ resource "aws_iam_policy" "fargate_policy" {
      ~ arn         = "arn:aws:iam::043894507808:policy/graphql-api-test-fargate-policy" -> (known after apply)
      ~ id          = "arn:aws:iam::043894507808:policy/graphql-api-test-fargate-policy" -> (known after apply)
      ~ name        = "graphql-api-test-fargate-policy" -> "graphql-api-dev-fargate-policy" # forces replacement
      + name_prefix = (known after apply)
      ~ policy_id   = "ANPAQUOCRBEQFIOU4CLJ7" -> (known after apply)
      - tags        = {} -> null
      ~ tags_all    = {} -> (known after apply)
        # (3 unchanged attributes hidden)
    }

  # aws_iam_role.ecs_task_execution_role must be replaced
-/+ resource "aws_iam_role" "ecs_task_execution_role" {
      ~ arn                   = "arn:aws:iam::043894507808:role/graphql-api-test-execution-role" -> (known after apply)
      ~ create_date           = "2023-04-20T17:06:58Z" -> (known after apply)
      ~ id                    = "graphql-api-test-execution-role" -> (known after apply)
      ~ managed_policy_arns   = [
          - "arn:aws:iam::043894507808:policy/graphql-api-test-fargate-policy",
          - "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy",
        ] -> (known after apply)
      ~ name                  = "graphql-api-test-execution-role" -> "graphql-api-dev-execution-role" # forces replacement
      + name_prefix           = (known after apply)
      - tags                  = {} -> null
      ~ tags_all              = {} -> (known after apply)
      ~ unique_id             = "AROAQUOCRBEQGPSU7GEUG" -> (known after apply)
        # (4 unchanged attributes hidden)
    }

  # aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment1 must be replaced
-/+ resource "aws_iam_role_policy_attachment" "ecs-task-execution-role-policy-attachment1" {
      ~ id         = "graphql-api-test-execution-role-20230420170658980700000002" -> (known after apply)
      ~ role       = "graphql-api-test-execution-role" -> "graphql-api-dev-execution-role" # forces replacement
        # (1 unchanged attribute hidden)
    }

  # aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment2 must be replaced
-/+ resource "aws_iam_role_policy_attachment" "ecs-task-execution-role-policy-attachment2" {
      ~ id         = "graphql-api-test-execution-role-20230420170658951000000001" -> (known after apply)
      ~ policy_arn = "arn:aws:iam::043894507808:policy/graphql-api-test-fargate-policy" # forces replacement -> (known after apply)
      ~ role       = "graphql-api-test-execution-role" -> "graphql-api-dev-execution-role" # forces replacement
    }

  # aws_lb.alb will be created
  + resource "aws_lb" "alb" {
      + arn                                         = (known after apply)
      + arn_suffix                                  = (known after apply)
      + desync_mitigation_mode                      = "defensive"
      + dns_name                                    = (known after apply)
      + drop_invalid_header_fields                  = false
      + enable_deletion_protection                  = false
      + enable_http2                                = true
      + enable_tls_version_and_cipher_suite_headers = false
      + enable_waf_fail_open                        = false
      + enable_xff_client_port                      = false
      + id                                          = (known after apply)
      + idle_timeout                                = 60
      + internal                                    = false
      + ip_address_type                             = "ipv4"
      + load_balancer_type                          = "application"
      + name                                        = "graphql-api-dev-alb"
      + preserve_host_header                        = false
      + security_groups                             = (known after apply)
      + subnets                                     = (known after apply)
      + tags_all                                    = (known after apply)
      + vpc_id                                      = (known after apply)
      + xff_header_processing_mode                  = "append"
      + zone_id                                     = (known after apply)
    }

  # aws_lb_listener.listener will be created
  + resource "aws_lb_listener" "listener" {
      + arn               = (known after apply)
      + certificate_arn   = "arn:aws:acm:us-east-1:043894507808:certificate/bf306bea-c739-451e-bc54-bfd24909b37c"
      + id                = (known after apply)
      + load_balancer_arn = (known after apply)
      + port              = 443
      + protocol          = "HTTPS"
      + ssl_policy        = "ELBSecurityPolicy-2016-08"
      + tags_all          = (known after apply)

      + default_action {
          + order            = 1
          + target_group_arn = (known after apply)
          + type             = "forward"
        }
    }

  # aws_lb_target_group.target_group will be created
  + resource "aws_lb_target_group" "target_group" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = false
      + deregistration_delay               = "300"
      + id                                 = (known after apply)
      + ip_address_type                    = "ipv4"
      + lambda_multi_value_headers_enabled = false
      + load_balancing_algorithm_type      = "round_robin"
      + load_balancing_cross_zone_enabled  = (known after apply)
      + name                               = "graphql-api-dev"
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = "HTTP1"
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags_all                           = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = "vpc-0ee6fa0c508a5ca80"

      + health_check {
          + enabled             = true
          + healthy_threshold   = 3
          + interval            = 60
          + matcher             = "200"
          + path                = "/health"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 5
          + unhealthy_threshold = 2
        }

      + stickiness {
          + cookie_duration = 86400
          + enabled         = false
          + type            = "lb_cookie"
        }
    }

  # aws_route.vpc_peering_route will be created
  + resource "aws_route" "vpc_peering_route" {
      + destination_cidr_block    = "172.33.0.0/16"
      + id                        = (known after apply)
      + instance_id               = (known after apply)
      + instance_owner_id         = (known after apply)
      + network_interface_id      = (known after apply)
      + origin                    = (known after apply)
      + route_table_id            = "rtb-028683c282ba5ed8c"
      + state                     = (known after apply)
      + vpc_peering_connection_id = (known after apply)
    }

  # aws_security_group.graphql_api will be created
  + resource "aws_security_group" "graphql_api" {
      + arn                    = (known after apply)
      + description            = "Managed by Terraform"
      + egress                 = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 0
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "-1"
              + security_groups  = []
              + self             = false
              + to_port          = 0
            },
        ]
      + id                     = (known after apply)
      + ingress                = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 80
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 80
            },
        ]
      + name                   = "graphql-api-dev"
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags_all               = (known after apply)
      + vpc_id                 = "vpc-0ee6fa0c508a5ca80"
    }

  # aws_security_group.web_everyone2 will be created
  + resource "aws_security_group" "web_everyone2" {
      + arn                    = (known after apply)
      + description            = "Allow web traffic from everyone"
      + egress                 = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 0
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "-1"
              + security_groups  = []
              + self             = false
              + to_port          = 0
            },
        ]
      + id                     = (known after apply)
      + ingress                = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 443
              + ipv6_cidr_blocks = [
                  + "::/0",
                ]
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 443
            },
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 80
              + ipv6_cidr_blocks = [
                  + "::/0",
                ]
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 80
            },
        ]
      + name                   = "web-everyone2"
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags                   = {
          + "Name" = "web-everyone2"
        }
      + tags_all               = {
          + "Name" = "web-everyone2"
        }
      + vpc_id                 = "vpc-0ee6fa0c508a5ca80"
    }

  # aws_subnet.subnet["us-east-1b"] will be created
  + resource "aws_subnet" "subnet" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "us-east-1b"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.33.0.0/18"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = true
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = "ip-name"
      + tags_all                                       = (known after apply)
      + vpc_id                                         = "vpc-0ee6fa0c508a5ca80"
    }

  # aws_subnet.subnet["us-east-1d"] will be created
  + resource "aws_subnet" "subnet" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "us-east-1d"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.33.64.0/18"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = true
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = "ip-name"
      + tags_all                                       = (known after apply)
      + vpc_id                                         = "vpc-0ee6fa0c508a5ca80"
    }

  # aws_vpc_peering_connection.peering_connection will be created
  + resource "aws_vpc_peering_connection" "peering_connection" {
      + accept_status = (known after apply)
      + auto_accept   = true
      + id            = (known after apply)
      + peer_owner_id = (known after apply)
      + peer_region   = (known after apply)
      + peer_vpc_id   = "vpc-05493280cd154e867"
      + tags          = {
          + "Name" = "VPC Peering between main vpc and graphql-api-dev"
        }
      + tags_all      = {
          + "Name" = "VPC Peering between main vpc and graphql-api-dev"
        }
      + vpc_id        = "vpc-0ee6fa0c508a5ca80"

      + accepter {
          + allow_classic_link_to_remote_vpc = false
          + allow_remote_vpc_dns_resolution  = true
          + allow_vpc_to_remote_classic_link = false
        }

      + requester {
          + allow_classic_link_to_remote_vpc = false
          + allow_remote_vpc_dns_resolution  = true
          + allow_vpc_to_remote_classic_link = false
        }
    }

Plan: 19 to add, 0 to change, 7 to destroy.

Pushed by: @renovate[bot], Action: pull_request, Environment: dev

@renovate renovate bot force-pushed the renovate/ethers-5.x branch from 42e5070 to 4f63c98 Compare April 23, 2023 03:34
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in Terraform Cloud. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

To view this run in a browser, visit:
https://app.terraform.io/app/CrimLog/dev/runs/run-fWkEzigGaopTN2YL

Waiting for the plan to start...

Terraform v1.4.5
on linux_amd64
Initializing plugins and modules...
data.aws_acm_certificate.cert: Refreshing...
data.aws_acm_certificate.cert: Refresh complete after 0s [id=arn:aws:acm:us-east-1:043894507808:certificate/bf306bea-c739-451e-bc54-bfd24909b37c]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # aws_cloudwatch_log_group.log_group will be created
  + resource "aws_cloudwatch_log_group" "log_group" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + name              = "/ecs/graphql-api-dev"
      + name_prefix       = (known after apply)
      + retention_in_days = 0
      + skip_destroy      = false
      + tags_all          = (known after apply)
    }

  # aws_default_route_table.default will be created
  + resource "aws_default_route_table" "default" {
      + arn                    = (known after apply)
      + default_route_table_id = (known after apply)
      + id                     = (known after apply)
      + owner_id               = (known after apply)
      + route                  = [
          + {
              + cidr_block                 = "0.0.0.0/0"
              + core_network_arn           = ""
              + destination_prefix_list_id = ""
              + egress_only_gateway_id     = ""
              + gateway_id                 = (known after apply)
              + instance_id                = ""
              + ipv6_cidr_block            = ""
              + nat_gateway_id             = ""
              + network_interface_id       = ""
              + transit_gateway_id         = ""
              + vpc_endpoint_id            = ""
              + vpc_peering_connection_id  = ""
            },
          + {
              + cidr_block                 = (known after apply)
              + core_network_arn           = ""
              + destination_prefix_list_id = ""
              + egress_only_gateway_id     = ""
              + gateway_id                 = ""
              + instance_id                = ""
              + ipv6_cidr_block            = ""
              + nat_gateway_id             = ""
              + network_interface_id       = ""
              + transit_gateway_id         = ""
              + vpc_endpoint_id            = ""
              + vpc_peering_connection_id  = (known after apply)
            },
        ]
      + tags_all               = (known after apply)
      + vpc_id                 = (known after apply)
    }

  # aws_default_security_group.default will be created
  + resource "aws_default_security_group" "default" {
      + arn                    = (known after apply)
      + description            = (known after apply)
      + egress                 = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 0
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "-1"
              + security_groups  = []
              + self             = false
              + to_port          = 0
            },
        ]
      + id                     = (known after apply)
      + ingress                = [
          + {
              + cidr_blocks      = [
                  + "172.33.0.0/16",
                ]
              + description      = "Default graphql-api-dev VPC"
              + from_port        = 5432
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 5432
            },
        ]
      + name                   = (known after apply)
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags                   = {
          + "Name" = "RDS-Postgres graphql-api-dev"
        }
      + tags_all               = {
          + "Name" = "RDS-Postgres graphql-api-dev"
        }
      + vpc_id                 = (known after apply)
    }

  # aws_default_vpc.vpc will be created
  + resource "aws_default_vpc" "vpc" {
      + arn                                  = (known after apply)
      + cidr_block                           = (known after apply)
      + default_network_acl_id               = (known after apply)
      + default_route_table_id               = (known after apply)
      + default_security_group_id            = (known after apply)
      + dhcp_options_id                      = (known after apply)
      + enable_classiclink                   = (known after apply)
      + enable_classiclink_dns_support       = (known after apply)
      + enable_dns_hostnames                 = true
      + enable_dns_support                   = true
      + enable_network_address_usage_metrics = false
      + existing_default_vpc                 = (known after apply)
      + force_destroy                        = false
      + id                                   = (known after apply)
      + instance_tenancy                     = (known after apply)
      + ipv6_association_id                  = (known after apply)
      + ipv6_cidr_block                      = (known after apply)
      + ipv6_cidr_block_network_border_group = (known after apply)
      + main_route_table_id                  = (known after apply)
      + owner_id                             = (known after apply)
      + tags_all                             = (known after apply)
    }

  # aws_ecs_cluster.cluster will be created
  + resource "aws_ecs_cluster" "cluster" {
      + arn                = (known after apply)
      + capacity_providers = (known after apply)
      + id                 = (known after apply)
      + name               = "graphql-api-dev"
      + tags_all           = (known after apply)

      + setting {
          + name  = "containerInsights"
          + value = "disabled"
        }
    }

  # aws_ecs_service.service will be created
  + resource "aws_ecs_service" "service" {
      + cluster                            = (known after apply)
      + deployment_maximum_percent         = 200
      + deployment_minimum_healthy_percent = 100
      + desired_count                      = 1
      + enable_ecs_managed_tags            = true
      + enable_execute_command             = false
      + health_check_grace_period_seconds  = 0
      + iam_role                           = (known after apply)
      + id                                 = (known after apply)
      + launch_type                        = "FARGATE"
      + name                               = "graphql-api-dev-svc"
      + platform_version                   = "LATEST"
      + propagate_tags                     = "NONE"
      + scheduling_strategy                = "REPLICA"
      + tags_all                           = (known after apply)
      + task_definition                    = (known after apply)
      + triggers                           = (known after apply)
      + wait_for_steady_state              = false

      + deployment_circuit_breaker {
          + enable   = false
          + rollback = false
        }

      + deployment_controller {
          + type = "ECS"
        }

      + load_balancer {
          + container_name   = "graphql-api-dev-container"
          + container_port   = 80
          + target_group_arn = (known after apply)
        }

      + network_configuration {
          + assign_public_ip = true
          + security_groups  = (known after apply)
          + subnets          = (known after apply)
        }
    }

  # aws_ecs_task_definition.definition will be created
  + resource "aws_ecs_task_definition" "definition" {
      + arn                      = (known after apply)
      + arn_without_revision     = (known after apply)
      + container_definitions    = jsonencode(
            [
              + {
                  + cpu              = 0
                  + environment      = [
                      + {
                          + name  = "NODE_ENV"
                          + value = "dev"
                        },
                      + {
                          + name  = "PORT"
                          + value = "80"
                        },
                    ]
                  + essential        = true
                  + image            = "043894507808.dkr.ecr.us-east-1.amazonaws.com/graphql-api:1be748aff6b491790a072df4e2c8b90b749a8c4f"
                  + logConfiguration = {
                      + logDriver = "awslogs"
                      + options   = {
                          + awslogs-group         = "/ecs/graphql-api-dev"
                          + awslogs-region        = "us-east-1"
                          + awslogs-stream-prefix = "ecs"
                        }
                    }
                  + mountPoints      = []
                  + name             = "graphql-api-dev-container"
                  + portMappings     = [
                      + {
                          + containerPort = 80
                          + hostPort      = 80
                          + protocol      = "tcp"
                        },
                    ]
                  + secrets          = [
                      + {
                          + name      = "JWT_SECRET"
                          + valueFrom = "arn:aws:secretsmanager:us-east-1:043894507808:secret:graphql-api-secrets-ajTuEN:JWT_SECRET::"
                        },
                      + {
                          + name      = "DATABASE_URL"
                          + valueFrom = "arn:aws:secretsmanager:us-east-1:043894507808:secret:graphql-api-secrets-ajTuEN:DATABASE_URL::"
                        },
                      + {
                          + name      = "ALCHEMY_API_KEY"
                          + valueFrom = "arn:aws:secretsmanager:us-east-1:043894507808:secret:graphql-api-secrets-ajTuEN:ALCHEMY_API_KEY::"
                        },
                      + {
                          + name      = "MATIC_PRIVATE_KEY"
                          + valueFrom = "arn:aws:secretsmanager:us-east-1:043894507808:secret:graphql-api-secrets-ajTuEN:MATIC_PRIVATE_KEY::"
                        },
                    ]
                  + volumesFrom      = []
                },
            ]
        )
      + cpu                      = "256"
      + execution_role_arn       = (known after apply)
      + family                   = "graphql-api-dev-task"
      + id                       = (known after apply)
      + memory                   = "512"
      + network_mode             = "awsvpc"
      + requires_compatibilities = [
          + "FARGATE",
        ]
      + revision                 = (known after apply)
      + skip_destroy             = false
      + tags_all                 = (known after apply)

      + runtime_platform {
          + operating_system_family = "LINUX"
        }
    }

  # aws_iam_policy.fargate_policy will be created
  + resource "aws_iam_policy" "fargate_policy" {
      + arn         = (known after apply)
      + description = "Necessary permissions for a Fargate task to run"
      + id          = (known after apply)
      + name        = "graphql-api-dev-fargate-policy"
      + name_prefix = (known after apply)
      + path        = "/"
      + policy      = jsonencode(
            {
              + Statement = [
                  + {
                      + Action   = [
                          + "ssm:GetParameters",
                          + "secretsmanager:GetSecretValue",
                          + "kms:Decrypt",
                        ]
                      + Effect   = "Allow"
                      + Resource = "*"
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + policy_id   = (known after apply)
      + tags_all    = (known after apply)
    }

  # aws_iam_role.ecs_task_execution_role will be created
  + resource "aws_iam_role" "ecs_task_execution_role" {
      + arn                   = (known after apply)
      + assume_role_policy    = jsonencode(
            {
              + Statement = [
                  + {
                      + Action    = "sts:AssumeRole"
                      + Effect    = "Allow"
                      + Principal = {
                          + Service = "ecs-tasks.amazonaws.com"
                        }
                      + Sid       = ""
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + create_date           = (known after apply)
      + force_detach_policies = false
      + id                    = (known after apply)
      + managed_policy_arns   = (known after apply)
      + max_session_duration  = 3600
      + name                  = "graphql-api-dev-execution-role"
      + name_prefix           = (known after apply)
      + path                  = "/"
      + tags_all              = (known after apply)
      + unique_id             = (known after apply)
    }

  # aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment1 will be created
  + resource "aws_iam_role_policy_attachment" "ecs-task-execution-role-policy-attachment1" {
      + id         = (known after apply)
      + policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
      + role       = "graphql-api-dev-execution-role"
    }

  # aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment2 will be created
  + resource "aws_iam_role_policy_attachment" "ecs-task-execution-role-policy-attachment2" {
      + id         = (known after apply)
      + policy_arn = (known after apply)
      + role       = "graphql-api-dev-execution-role"
    }

  # aws_internet_gateway.gw will be created
  + resource "aws_internet_gateway" "gw" {
      + arn      = (known after apply)
      + id       = (known after apply)
      + owner_id = (known after apply)
      + tags     = {
          + "Name" = "main"
        }
      + tags_all = {
          + "Name" = "main"
        }
      + vpc_id   = (known after apply)
    }

  # aws_lb.alb will be created
  + resource "aws_lb" "alb" {
      + arn                                         = (known after apply)
      + arn_suffix                                  = (known after apply)
      + desync_mitigation_mode                      = "defensive"
      + dns_name                                    = (known after apply)
      + drop_invalid_header_fields                  = false
      + enable_deletion_protection                  = false
      + enable_http2                                = true
      + enable_tls_version_and_cipher_suite_headers = false
      + enable_waf_fail_open                        = false
      + enable_xff_client_port                      = false
      + id                                          = (known after apply)
      + idle_timeout                                = 60
      + internal                                    = false
      + ip_address_type                             = "ipv4"
      + load_balancer_type                          = "application"
      + name                                        = "graphql-api-dev-alb"
      + preserve_host_header                        = false
      + security_groups                             = (known after apply)
      + subnets                                     = (known after apply)
      + tags_all                                    = (known after apply)
      + vpc_id                                      = (known after apply)
      + xff_header_processing_mode                  = "append"
      + zone_id                                     = (known after apply)
    }

  # aws_lb_listener.listener will be created
  + resource "aws_lb_listener" "listener" {
      + arn               = (known after apply)
      + certificate_arn   = "arn:aws:acm:us-east-1:043894507808:certificate/bf306bea-c739-451e-bc54-bfd24909b37c"
      + id                = (known after apply)
      + load_balancer_arn = (known after apply)
      + port              = 443
      + protocol          = "HTTPS"
      + ssl_policy        = "ELBSecurityPolicy-2016-08"
      + tags_all          = (known after apply)

      + default_action {
          + order            = 1
          + target_group_arn = (known after apply)
          + type             = "forward"
        }
    }

  # aws_lb_target_group.target_group will be created
  + resource "aws_lb_target_group" "target_group" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = false
      + deregistration_delay               = "300"
      + id                                 = (known after apply)
      + ip_address_type                    = "ipv4"
      + lambda_multi_value_headers_enabled = false
      + load_balancing_algorithm_type      = "round_robin"
      + load_balancing_cross_zone_enabled  = (known after apply)
      + name                               = "graphql-api-dev"
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = "HTTP1"
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags_all                           = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)

      + health_check {
          + enabled             = true
          + healthy_threshold   = 3
          + interval            = 60
          + matcher             = "200"
          + path                = "/health"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 5
          + unhealthy_threshold = 2
        }

      + stickiness {
          + cookie_duration = 86400
          + enabled         = false
          + type            = "lb_cookie"
        }
    }

  # aws_route.vpc_peering_route will be created
  + resource "aws_route" "vpc_peering_route" {
      + destination_cidr_block    = "172.33.0.0/16"
      + id                        = (known after apply)
      + instance_id               = (known after apply)
      + instance_owner_id         = (known after apply)
      + network_interface_id      = (known after apply)
      + origin                    = (known after apply)
      + route_table_id            = (known after apply)
      + state                     = (known after apply)
      + vpc_peering_connection_id = (known after apply)
    }

  # aws_security_group.graphql_api will be created
  + resource "aws_security_group" "graphql_api" {
      + arn                    = (known after apply)
      + description            = "Managed by Terraform"
      + egress                 = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 0
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "-1"
              + security_groups  = []
              + self             = false
              + to_port          = 0
            },
        ]
      + id                     = (known after apply)
      + ingress                = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 80
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 80
            },
        ]
      + name                   = "graphql-api-dev"
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags_all               = (known after apply)
      + vpc_id                 = (known after apply)
    }

  # aws_security_group.web_everyone2 will be created
  + resource "aws_security_group" "web_everyone2" {
      + arn                    = (known after apply)
      + description            = "Allow web traffic from everyone"
      + egress                 = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 0
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "-1"
              + security_groups  = []
              + self             = false
              + to_port          = 0
            },
        ]
      + id                     = (known after apply)
      + ingress                = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 443
              + ipv6_cidr_blocks = [
                  + "::/0",
                ]
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 443
            },
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + description      = ""
              + from_port        = 80
              + ipv6_cidr_blocks = [
                  + "::/0",
                ]
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 80
            },
        ]
      + name                   = "web-everyone2"
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags                   = {
          + "Name" = "web-everyone2"
        }
      + tags_all               = {
          + "Name" = "web-everyone2"
        }
      + vpc_id                 = (known after apply)
    }

  # aws_subnet.subnet["us-east-1b"] will be created
  + resource "aws_subnet" "subnet" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "us-east-1b"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.33.0.0/18"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = true
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = "ip-name"
      + tags_all                                       = (known after apply)
      + vpc_id                                         = (known after apply)
    }

  # aws_subnet.subnet["us-east-1d"] will be created
  + resource "aws_subnet" "subnet" {
      + arn                                            = (known after apply)
      + assign_ipv6_address_on_creation                = false
      + availability_zone                              = "us-east-1d"
      + availability_zone_id                           = (known after apply)
      + cidr_block                                     = "172.33.64.0/18"
      + enable_dns64                                   = false
      + enable_resource_name_dns_a_record_on_launch    = false
      + enable_resource_name_dns_aaaa_record_on_launch = false
      + id                                             = (known after apply)
      + ipv6_cidr_block_association_id                 = (known after apply)
      + ipv6_native                                    = false
      + map_public_ip_on_launch                        = true
      + owner_id                                       = (known after apply)
      + private_dns_hostname_type_on_launch            = "ip-name"
      + tags_all                                       = (known after apply)
      + vpc_id                                         = (known after apply)
    }

  # aws_vpc.vpc will be created
  + resource "aws_vpc" "vpc" {
      + arn                                  = (known after apply)
      + assign_generated_ipv6_cidr_block     = false
      + cidr_block                           = "172.33.0.0/16"
      + default_network_acl_id               = (known after apply)
      + default_route_table_id               = (known after apply)
      + default_security_group_id            = (known after apply)
      + dhcp_options_id                      = (known after apply)
      + enable_classiclink                   = (known after apply)
      + enable_classiclink_dns_support       = (known after apply)
      + enable_dns_hostnames                 = true
      + enable_dns_support                   = true
      + enable_network_address_usage_metrics = false
      + id                                   = (known after apply)
      + instance_tenancy                     = "default"
      + ipv6_association_id                  = (known after apply)
      + ipv6_cidr_block                      = (known after apply)
      + ipv6_cidr_block_network_border_group = (known after apply)
      + main_route_table_id                  = (known after apply)
      + owner_id                             = (known after apply)
      + tags                                 = {
          + "Name" = "graphql-api-dev-vpc"
        }
      + tags_all                             = {
          + "Name" = "graphql-api-dev-vpc"
        }
    }

  # aws_vpc_peering_connection.peering_connection will be created
  + resource "aws_vpc_peering_connection" "peering_connection" {
      + accept_status = (known after apply)
      + auto_accept   = true
      + id            = (known after apply)
      + peer_owner_id = (known after apply)
      + peer_region   = (known after apply)
      + peer_vpc_id   = (known after apply)
      + tags          = {
          + "Name" = "VPC Peering between main vpc and graphql-api-dev"
        }
      + tags_all      = {
          + "Name" = "VPC Peering between main vpc and graphql-api-dev"
        }
      + vpc_id        = (known after apply)

      + accepter {
          + allow_classic_link_to_remote_vpc = false
          + allow_remote_vpc_dns_resolution  = true
          + allow_vpc_to_remote_classic_link = false
        }

      + requester {
          + allow_classic_link_to_remote_vpc = false
          + allow_remote_vpc_dns_resolution  = true
          + allow_vpc_to_remote_classic_link = false
        }
    }

Plan: 22 to add, 0 to change, 0 to destroy.

Pushed by: @renovate[bot], Action: pull_request, Environment: dev

@renovate renovate bot force-pushed the renovate/ethers-5.x branch from 4f63c98 to e87248e Compare April 28, 2023 14:44
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in Terraform Cloud. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

To view this run in a browser, visit:
https://app.terraform.io/app/CrimLog/dev/runs/run-p5pkULStTswkaUQo

Waiting for the plan to start...

Terraform v1.4.5
on linux_amd64
Initializing plugins and modules...
aws_ecs_cluster.cluster: Refreshing state... [id=arn:aws:ecs:us-east-1:043894507808:cluster/graphql-api-dev]
aws_default_vpc.vpc: Refreshing state... [id=vpc-0d6048d87526ca2aa]
aws_iam_role.ecs_task_execution_role: Refreshing state... [id=graphql-api-dev-execution-role]
data.aws_acm_certificate.cert: Refreshing...
aws_cloudwatch_log_group.log_group: Refreshing state... [id=/ecs/graphql-api-dev]
aws_iam_policy.fargate_policy: Refreshing state... [id=arn:aws:iam::043894507808:policy/graphql-api-dev-fargate-policy]
aws_vpc.vpc: Refreshing state... [id=vpc-0dd1abc04eb78546a]
aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment1: Refreshing state... [id=graphql-api-dev-execution-role-20230428144451387600000002]
aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment2: Refreshing state... [id=graphql-api-dev-execution-role-20230428144451372400000001]
aws_ecs_task_definition.definition: Refreshing state... [id=graphql-api-dev-task]
data.aws_acm_certificate.cert: Refresh complete after 0s [id=arn:aws:acm:us-east-1:043894507808:certificate/bf306bea-c739-451e-bc54-bfd24909b37c]
aws_lb_target_group.target_group: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:043894507808:targetgroup/graphql-api-dev/83e131544a9b44d8]
aws_subnet.subnet["us-east-1d"]: Refreshing state... [id=subnet-0699b39f84d929a68]
aws_internet_gateway.gw: Refreshing state... [id=igw-0f722e2ec075b406a]
aws_vpc_peering_connection.peering_connection: Refreshing state... [id=pcx-02ca43ff46d27f622]
aws_subnet.subnet["us-east-1b"]: Refreshing state... [id=subnet-068e99669610bf988]
aws_security_group.graphql_api: Refreshing state... [id=sg-0cead3059c486959e]
aws_security_group.web_everyone2: Refreshing state... [id=sg-0ceb37cfb20b50043]
aws_default_security_group.default: Refreshing state... [id=sg-061747dff8a994e8b]
aws_route.vpc_peering_route: Refreshing state... [id=r-rtb-09b02ae3a536a3f7a2811395018]
aws_default_route_table.default: Refreshing state... [id=rtb-0209f8b11e4513cc2]
aws_ecs_service.service: Refreshing state... [id=arn:aws:ecs:us-east-1:043894507808:service/graphql-api-dev/graphql-api-dev-svc]
aws_lb.alb: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:043894507808:loadbalancer/app/graphql-api-dev-alb/252731848262f1ac]
aws_lb_listener.listener: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:043894507808:listener/app/graphql-api-dev-alb/252731848262f1ac/cee2a346a2c2a344]
aws_iam_role.ecs_task_execution_role: Drift detected (update)
aws_ecs_task_definition.definition: Drift detected (update)
aws_lb.alb: Drift detected (update)
aws_security_group.graphql_api: Drift detected (update)
aws_ecs_service.service: Drift detected (update)
aws_lb_listener.listener: Drift detected (update)
aws_default_route_table.default: Drift detected (update)
aws_iam_policy.fargate_policy: Drift detected (update)
aws_ecs_cluster.cluster: Drift detected (update)
aws_default_vpc.vpc: Drift detected (update)
aws_lb_target_group.target_group: Drift detected (update)
aws_cloudwatch_log_group.log_group: Drift detected (update)
aws_subnet.subnet["us-east-1b"]: Drift detected (update)
aws_subnet.subnet["us-east-1d"]: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_ecs_service.service will be updated in-place
  ~ resource "aws_ecs_service" "service" {
        id                                 = "arn:aws:ecs:us-east-1:043894507808:service/graphql-api-dev/graphql-api-dev-svc"
        name                               = "graphql-api-dev-svc"
        tags                               = {}
      ~ task_definition                    = "arn:aws:ecs:us-east-1:043894507808:task-definition/graphql-api-dev-task:3" -> (known after apply)
        # (15 unchanged attributes hidden)

        # (4 unchanged blocks hidden)
    }

  # aws_ecs_task_definition.definition must be replaced
-/+ resource "aws_ecs_task_definition" "definition" {
      ~ arn                      = "arn:aws:ecs:us-east-1:043894507808:task-definition/graphql-api-dev-task:3" -> (known after apply)
      ~ arn_without_revision     = "arn:aws:ecs:us-east-1:043894507808:task-definition/graphql-api-dev-task" -> (known after apply)
      ~ container_definitions    = jsonencode(
          ~ [
              ~ {
                  ~ image            = "043894507808.dkr.ecr.us-east-1.amazonaws.com/graphql-api:ea0cbb6f1af2b62f18d904183442047872313923" -> "043894507808.dkr.ecr.us-east-1.amazonaws.com/graphql-api:3aeb6daf5da1b4fc4193528f7942fc9163ad4bb4"
                    name             = "graphql-api-dev-container"
                    # (8 unchanged attributes hidden)
                },
            ] # forces replacement
        )
      ~ id                       = "graphql-api-dev-task" -> (known after apply)
      ~ revision                 = 3 -> (known after apply)
      - tags                     = {} -> null
      ~ tags_all                 = {} -> (known after apply)
        # (7 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

Plan: 1 to add, 1 to change, 1 to destroy.

Pushed by: @renovate[bot], Action: pull_request, Environment: dev

@renovate renovate bot force-pushed the renovate/ethers-5.x branch from e87248e to b40c7db Compare April 30, 2023 16:58
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in Terraform Cloud. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

To view this run in a browser, visit:
https://app.terraform.io/app/CrimLog/dev/runs/run-roVZAU6NBpVmS1Zq

Waiting for the plan to start...

Terraform v1.4.5
on linux_amd64
Initializing plugins and modules...
aws_ecs_cluster.cluster: Refreshing state... [id=arn:aws:ecs:us-east-1:043894507808:cluster/graphql-api-dev]
aws_default_vpc.vpc: Refreshing state... [id=vpc-0d6048d87526ca2aa]
aws_vpc.vpc: Refreshing state... [id=vpc-0dd1abc04eb78546a]
data.aws_acm_certificate.cert: Refreshing...
aws_iam_role.ecs_task_execution_role: Refreshing state... [id=graphql-api-dev-execution-role]
aws_cloudwatch_log_group.log_group: Refreshing state... [id=/ecs/graphql-api-dev]
aws_iam_policy.fargate_policy: Refreshing state... [id=arn:aws:iam::043894507808:policy/graphql-api-dev-fargate-policy]
aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment1: Refreshing state... [id=graphql-api-dev-execution-role-20230428144451387600000002]
aws_iam_role_policy_attachment.ecs-task-execution-role-policy-attachment2: Refreshing state... [id=graphql-api-dev-execution-role-20230428144451372400000001]
aws_ecs_task_definition.definition: Refreshing state... [id=graphql-api-dev-task]
data.aws_acm_certificate.cert: Refresh complete after 1s [id=arn:aws:acm:us-east-1:043894507808:certificate/bf306bea-c739-451e-bc54-bfd24909b37c]
aws_security_group.graphql_api: Refreshing state... [id=sg-0cead3059c486959e]
aws_subnet.subnet["us-east-1d"]: Refreshing state... [id=subnet-0699b39f84d929a68]
aws_subnet.subnet["us-east-1b"]: Refreshing state... [id=subnet-068e99669610bf988]
aws_default_security_group.default: Refreshing state... [id=sg-061747dff8a994e8b]
aws_internet_gateway.gw: Refreshing state... [id=igw-0f722e2ec075b406a]
aws_lb_target_group.target_group: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:043894507808:targetgroup/graphql-api-dev/83e131544a9b44d8]
aws_security_group.web_everyone2: Refreshing state... [id=sg-0ceb37cfb20b50043]
aws_lb.alb: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:043894507808:loadbalancer/app/graphql-api-dev-alb/252731848262f1ac]
aws_ecs_service.service: Refreshing state... [id=arn:aws:ecs:us-east-1:043894507808:service/graphql-api-dev/graphql-api-dev-svc]
aws_vpc_peering_connection.peering_connection: Refreshing state... [id=pcx-02ca43ff46d27f622]
aws_lb_listener.listener: Refreshing state... [id=arn:aws:elasticloadbalancing:us-east-1:043894507808:listener/app/graphql-api-dev-alb/252731848262f1ac/cee2a346a2c2a344]
aws_route.vpc_peering_route: Refreshing state... [id=r-rtb-09b02ae3a536a3f7a2811395018]
aws_default_route_table.default: Refreshing state... [id=rtb-0209f8b11e4513cc2]
aws_subnet.subnet["us-east-1b"]: Drift detected (update)
aws_subnet.subnet["us-east-1d"]: Drift detected (update)
aws_lb_listener.listener: Drift detected (update)
aws_security_group.graphql_api: Drift detected (update)
aws_ecs_service.service: Drift detected (update)
aws_cloudwatch_log_group.log_group: Drift detected (update)
aws_lb_target_group.target_group: Drift detected (update)
aws_iam_role.ecs_task_execution_role: Drift detected (update)
aws_default_route_table.default: Drift detected (update)
aws_iam_policy.fargate_policy: Drift detected (update)
aws_lb.alb: Drift detected (update)
aws_ecs_task_definition.definition: Drift detected (update)
aws_default_vpc.vpc: Drift detected (update)
aws_ecs_cluster.cluster: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_ecs_service.service will be updated in-place
  ~ resource "aws_ecs_service" "service" {
        id                                 = "arn:aws:ecs:us-east-1:043894507808:service/graphql-api-dev/graphql-api-dev-svc"
        name                               = "graphql-api-dev-svc"
        tags                               = {}
      ~ task_definition                    = "arn:aws:ecs:us-east-1:043894507808:task-definition/graphql-api-dev-task:3" -> (known after apply)
        # (15 unchanged attributes hidden)

        # (4 unchanged blocks hidden)
    }

  # aws_ecs_task_definition.definition must be replaced
-/+ resource "aws_ecs_task_definition" "definition" {
      ~ arn                      = "arn:aws:ecs:us-east-1:043894507808:task-definition/graphql-api-dev-task:3" -> (known after apply)
      ~ arn_without_revision     = "arn:aws:ecs:us-east-1:043894507808:task-definition/graphql-api-dev-task" -> (known after apply)
      ~ container_definitions    = jsonencode(
          ~ [
              ~ {
                  ~ image            = "043894507808.dkr.ecr.us-east-1.amazonaws.com/graphql-api:ea0cbb6f1af2b62f18d904183442047872313923" -> "043894507808.dkr.ecr.us-east-1.amazonaws.com/graphql-api:a79fb35b75125ee78a8d608e7db60d39763fc966"
                    name             = "graphql-api-dev-container"
                    # (8 unchanged attributes hidden)
                },
            ] # forces replacement
        )
      ~ id                       = "graphql-api-dev-task" -> (known after apply)
      ~ revision                 = 3 -> (known after apply)
      - tags                     = {} -> null
      ~ tags_all                 = {} -> (known after apply)
        # (7 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

Plan: 1 to add, 1 to change, 1 to destroy.

Pushed by: @renovate[bot], Action: pull_request, Environment: dev

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant