Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update all minor dependencies #516

Merged
merged 1 commit into from
Oct 21, 2024
Merged

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 21, 2023

This PR contains the following updates:

Package Change Age Adoption Passing Confidence Type Update Pending
@aws-sdk/client-dynamodb (source) 3.430.0 -> 3.667.0 age adoption passing confidence dependencies minor 3.670.0 (+2)
@aws-sdk/client-lambda (source) 3.430.0 -> 3.667.0 age adoption passing confidence dependencies minor 3.670.0 (+2)
@aws-sdk/client-rds-data (source) 3.430.0 -> 3.667.0 age adoption passing confidence dependencies minor 3.670.0 (+2)
@aws-sdk/client-s3 (source) 3.430.0 -> 3.667.0 age adoption passing confidence dependencies minor 3.670.0 (+2)
@aws-sdk/client-secrets-manager (source) 3.478.0 -> 3.667.0 age adoption passing confidence dependencies minor 3.670.0 (+2)
@aws-sdk/client-sqs (source) 3.430.0 -> 3.667.0 age adoption passing confidence dependencies minor 3.670.0 (+2)
@aws-sdk/lib-dynamodb (source) 3.430.0 -> 3.667.0 age adoption passing confidence dependencies minor 3.670.0 (+2)
@types/node (source) 20.9.0 -> 20.16.11 age adoption passing confidence devDependencies minor
@types/node (source) 20.10.0 -> 20.16.11 age adoption passing confidence devDependencies minor
@types/node (source) 20.11.24 -> 20.16.11 age adoption passing confidence devDependencies minor
@types/node (source) 20.12.8 -> 20.16.11 age adoption passing confidence devDependencies minor
@types/node (source) 20.9.4 -> 20.16.11 age adoption passing confidence devDependencies minor
@types/node (source) 20.12.2 -> 20.16.11 age adoption passing confidence devDependencies minor
@types/node (source) 20.10.5 -> 20.16.11 age adoption passing confidence devDependencies minor
@types/node (source) 20.11.17 -> 20.16.11 age adoption passing confidence devDependencies minor
aws (source) 5.59.0 -> 5.70.0 age adoption passing confidence required_provider minor
aws (source) 5.32.0 -> 5.70.0 age adoption passing confidence required_provider minor
font-awesome (source) 6.4.2 -> 6.6.0 age adoption passing confidence minor
typescript (source) 5.2.2 -> 5.6.2 age adoption passing confidence devDependencies minor 5.6.3
typescript (source) 5.3.2 -> 5.6.2 age adoption passing confidence devDependencies minor 5.6.3
typescript (source) 5.3.3 -> 5.6.2 age adoption passing confidence devDependencies minor 5.6.3
typescript (source) 5.4.3 -> 5.6.2 age adoption passing confidence devDependencies minor 5.6.3

Review

  • Updates have been tested and work
  • If updates are AWS related, versions match the infrastructure (e.g. Lambda runtime, database, etc.)

Release Notes

aws/aws-sdk-js-v3 (@​aws-sdk/client-dynamodb)

v3.667.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.666.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.665.0

Compare Source

Bug Fixes
  • codegen: accIdEpMode config resolver generation plugin (#​6544) (fc14586)

v3.664.0

Compare Source

Features
  • middleware-user-agent: add client config for userAgentAppId (#​6524) (2990ea8)

v3.662.0

Compare Source

Bug Fixes
  • s3-request-presigner: enable overriding hoistable headers (#​6535) (3c2e59c)

3.658.1 (2024-09-25)

Bug Fixes
  • clients: allow empty string field values for headers (#​6511) (1273ff3)

v3.658.1

Compare Source

Bug Fixes
  • clients: allow empty string field values for headers (#​6511) (1273ff3)

v3.658.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.656.0

Compare Source

Features
  • client-dynamodb: Generate account endpoint for DynamoDB requests when the account ID is available (a39132c)

v3.654.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

3.651.1 (2024-09-13)

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.651.1

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.650.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.649.0

Compare Source

Features
  • endpoints: codegen sync for request creation performance improvements (#​6449) (c8e8f28)

v3.648.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.645.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.637.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.635.0

Compare Source

Features

v3.632.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.631.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.629.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.624.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.623.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.622.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.621.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

3.620.1 (2024-07-29)

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.620.1

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.620.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.619.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.616.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.614.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.613.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.609.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.606.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.602.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.600.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.598.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.596.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.592.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.590.0

Compare Source

Bug Fixes
  • codegen: consistently add region as config option when generated client is Sigv4 but not AWS (#​6156) (06f51cc)

v3.588.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.587.0

Compare Source

3.587.0(2024-05-30)
Chores
  • codegen: update Smithy hash - ProviderError logging, timestamp millis (#​6147) (6bba0d66)
Documentation Changes
  • client-rds: Updates Amazon RDS documentation for Aurora Postgres DBname. (f03a9ee5)
New Features
  • clients: update client endpoints as of 2024-05-30 (d131ac0a)
  • client-cloudtrail: CloudTrail Lake returns PartitionKeys in the GetEventDataStore API response. Events are grouped into partitions based on these keys for better query performance. For example, the calendarday key groups events by day, while combining the calendarday key with the hour key groups them by day and hour. (88273bad)
  • client-sagemaker: Adds Model Card information as a new component to Model Package. Autopilot launches algorithm selection for TimeSeries modality to generate AutoML candidates per algorithm. (393afc7e)
  • client-bedrock-agent: With this release, Knowledge bases for Bedrock adds support for Titan Text Embedding v2. (c2f93e18)
  • client-connect: Adding associatedQueueIds as a SearchCriteria and response field to the SearchRoutingProfiles API (b46048a8)
  • client-emr-serverless: The release adds support for spark structured streaming. (572bc93e)
  • client-acm: add v2 smoke tests and smithy smokeTests trait for SDK testing. (c87de6ae)
  • client-bedrock-runtime: This release adds Converse and ConverseStream APIs to Bedrock Runtime (512d9014)
Bug Fixes
  • credentials-provider-ini: include general http provider when sourcing EcsContainer credentials (#​6132) (8cdaf0a1)

For list of updated packages, view updated-packages.md in assets-3.587.0.zip

v3.585.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.584.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.583.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.582.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.577.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.576.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.575.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.574.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.572.0

Compare Source

3.572.0(2024-05-08)
Chores
Documentation Changes
  • client-fms: The policy scope resource tag is always a string value, either a non-empty string or an empty string. (4f544d7c)
New Features
  • clients: update client endpoints as of 2024-05-08 (1e71a11f)
  • client-sqs: This release adds MessageSystemAttributeNames to ReceiveMessageRequest to replace AttributeNames. (35284e8f)
  • client-polly: Add new engine - generative - that builds the most expressive conversational voices. (daf6bd4c)
  • client-ec2: Adding Precision Hardware Clock (PHC) to public API DescribeInstanceTypes (711a8ff4)
  • client-cognito-identity-provider: Add EXTERNAL_PROVIDER enum value to UserStatusType. (0189ee3a)
  • client-ecr: This release adds pull through cache rules support for GitLab container registry in Amazon ECR. (a05338f5)
Tests

For list of updated packages, view updated-packages.md in assets-3.572.0.zip

v3.569.0

Compare Source

Bug Fixes
  • clients: add deps required by default credential providers (#​6055) (bfa8626)

v3.568.0

Compare Source

Features
  • client-dynamodb: This release adds support to specify an optional, maximum OnDemandThroughput for DynamoDB tables and global secondary indexes in the CreateTable or UpdateTable APIs. You can also override the OnDemandThroughput settings by calling the ImportTable, RestoreFromPointInTime, or RestoreFromBackup APIs. (7a4330d)

v3.567.0

Compare Source

Features

v3.565.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.564.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.563.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.556.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.554.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.552.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.549.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.540.0

Compare Source

Bug Fixes
  • util-endpoints: augment endpointFunctions inline in endpointResolver functions (#​5933) (42a791d)

v3.538.0

Compare Source

Features
  • client-dynamodb: This release introduces 3 new APIs ('GetResourcePolicy', 'PutResourcePolicy' and 'DeleteResourcePolicy') and modifies the existing 'CreateTable' API for the resource-based policy support. It also modifies several APIs to accept a 'TableArn' for the 'TableName' parameter. (4ce662f)

v3.535.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.533.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

3.529.1 (2024-03-08)

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.529.1

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.529.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.528.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.525.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.523.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.521.0

Compare Source

Features

v3.518.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.515.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.514.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.513.0

Compare Source

Features
  • experimentalIdentityAndAuth: release phase for services without customizations (#​5787) (4004ff6)

v3.511.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.509.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.507.0

Compare Source

Features

v3.506.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.504.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

3.503.1 (2024-01-30)

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.503.1

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.503.0

Compare Source

Note: Version bump only for package @​aws-sdk/client-dynamodb

v3.502.0

Compare Source

Features
  • credential-providers: lazy load STS & SSO clients in credential providers (#​5681) (d27301d)

[v3.501.0](https://redirect.github.com/aws/aws-sdk-js-v3/blob/HEAD/clients/client-dynamodb/CHANGELOG.md#35010-2024-


Configuration

📅 Schedule: Branch creation - "every weekend" in timezone America/Montreal, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/all-minor branch 5 times, most recently from 6b9ae8f to 9bac54b Compare October 25, 2023 21:33
@renovate renovate bot changed the title chore(deps): update all minor dependencies fix(deps): update all minor dependencies Oct 25, 2023
@renovate renovate bot force-pushed the renovate/all-minor branch 8 times, most recently from aac4087 to 71d2d04 Compare November 3, 2023 21:48
@renovate renovate bot force-pushed the renovate/all-minor branch 5 times, most recently from 65e8bae to d4b0ed4 Compare November 13, 2023 23:17
@renovate renovate bot force-pushed the renovate/all-minor branch 9 times, most recently from e0a3e01 to fb7cc19 Compare November 16, 2023 16:30
@renovate renovate bot force-pushed the renovate/all-minor branch 9 times, most recently from 887121c to 393131b Compare October 10, 2024 23:13
@renovate renovate bot force-pushed the renovate/all-minor branch 8 times, most recently from 99e1dd6 to 97ae1e9 Compare October 15, 2024 14:13
@bryan-robitaille bryan-robitaille changed the base branch from develop to main October 15, 2024 19:28
Copy link

⚠ Terrform update available

Terraform: 1.9.7 (using 1.9.2)
Terragrunt: 0.68.1 (using 0.63.2)

Copy link

Staging: load_balancer

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 3 to change, 0 to destroy
Show summary
CHANGE NAME
update aws_s3_object.maintenance_static_page_html_files["index-fr.html"]
aws_s3_object.maintenance_static_page_html_files["index.html"]
aws_wafv2_web_acl.forms_acl
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # aws_s3_object.maintenance_static_page_html_files["index-fr.html"] will be updated in-place
  ~ resource "aws_s3_object" "maintenance_static_page_html_files" {
      ~ etag                          = "5c195ef016b9e898437a543aba2301ac" -> "3be80c8fc3bbd8a51bbc9709fb555120"
        id                            = "index-fr.html"
        tags                          = {}
      + version_id                    = (known after apply)
        # (23 unchanged attributes hidden)
    }

  # aws_s3_object.maintenance_static_page_html_files["index.html"] will be updated in-place
  ~ resource "aws_s3_object" "maintenance_static_page_html_files" {
      ~ etag                          = "f15e6aa2fd75c9b6b97d93d2b1fedfbd" -> "83f45f59fb216b42e901683edd2f7529"
        id                            = "index.html"
        tags                          = {}
      + version_id                    = (known after apply)
        # (23 unchanged attributes hidden)
    }

  # aws_wafv2_web_acl.forms_acl will be updated in-place
  ~ resource "aws_wafv2_web_acl" "forms_acl" {
        id                          = "e8fc1b67-9d4d-4a29-8c94-65b37b30a231"
        name                        = "GCForms"
        tags                        = {}
        # (9 unchanged attributes hidden)

      - rule {
          - name     = "AWSManagedRulesAmazonIpReputationList" -> null
          - priority = 1 -> null

          - override_action {
              - none {}
            }

          - statement {
              - managed_rule_group_statement {
                  - name        = "AWSManagedRulesAmazonIpReputationList" -> null
                  - vendor_name = "AWS" -> null
                    # (1 unchanged attribute hidden)
                }
            }

          - visibility_config {
              - cloudwatch_metrics_enabled = true -> null
              - metric_name                = "AWSManagedRulesAmazonIpReputationList" -> null
              - sampled_requests_enabled   = true -> null
            }
        }
      - rule {
          - name     = "AWSManagedRulesKnownBadInputsRuleSet" -> null
          - priority = 40 -> null

          - override_action {
              - none {}
            }

          - statement {
              - managed_rule_group_statement {
                  - name        = "AWSManagedRulesKnownBadInputsRuleSet" -> null
                  - vendor_name = "AWS" -> null
                    # (1 unchanged attribute hidden)
                }
            }

          - visibility_config {
              - cloudwatch_metrics_enabled = true -> null
              - metric_name                = "AWSManagedRulesKnownBadInputsRuleSet" -> null
              - sampled_requests_enabled   = true -> null
            }
        }
      - rule {
          - name     = "AWSManagedRulesLinuxRuleSet" -> null
          - priority = 50 -> null

          - override_action {
              - none {}
            }

          - statement {
              - managed_rule_group_statement {
                  - name        = "AWSManagedRulesLinuxRuleSet" -> null
                  - vendor_name = "AWS" -> null
                    # (1 unchanged attribute hidden)
                }
            }

          - visibility_config {
              - cloudwatch_metrics_enabled = true -> null
              - metric_name                = "AWSManagedRulesLinuxRuleSet" -> null
              - sampled_requests_enabled   = true -> null
            }
        }
      - rule {
          - name     = "RateLimitersRuleGroup" -> null
          - priority = 10 -> null

          - override_action {
              - none {}
            }

          - statement {
              - rule_group_reference_statement {
                  - arn = "arn:aws:wafv2:ca-central-1:687401027353:regional/rulegroup/RateLimitersGroup/51f888d4-a82d-4c56-8031-0da78ea6df8c" -> null

                  - rule_action_override {
                      - name = "BlanketRequestLimit" -> null

                      - action_to_use {
                          - count {
                            }
                        }
                    }
                  - rule_action_override {
                      - name = "PostRequestLimit" -> null

                      - action_to_use {
                          - count {
                            }
                        }
                    }
                }
            }

          - visibility_config {
              - cloudwatch_metrics_enabled = true -> null
              - metric_name                = "rate_limiters_rule_group" -> null
              - sampled_requests_enabled   = false -> null
            }
        }
      + rule {
          + name     = "AWSManagedRulesAmazonIpReputationList"
          + priority = 1

          + override_action {
              + none {}
            }

          + statement {
              + managed_rule_group_statement {
                  + name        = "AWSManagedRulesAmazonIpReputationList"
                  + vendor_name = "AWS"
                }
            }

          + visibility_config {
              + cloudwatch_metrics_enabled = true
              + metric_name                = "AWSManagedRulesAmazonIpReputationList"
              + sampled_requests_enabled   = true
            }
        }
      + rule {
          + name     = "AWSManagedRulesKnownBadInputsRuleSet"
          + priority = 40

          + override_action {
              + none {}
            }

          + statement {
              + managed_rule_group_statement {
                  + name        = "AWSManagedRulesKnownBadInputsRuleSet"
                  + vendor_name = "AWS"
                }
            }

          + visibility_config {
              + cloudwatch_metrics_enabled = true
              + metric_name                = "AWSManagedRulesKnownBadInputsRuleSet"
              + sampled_requests_enabled   = true
            }
        }
      + rule {
          + name     = "AWSManagedRulesLinuxRuleSet"
          + priority = 50

          + override_action {
              + none {}
            }

          + statement {
              + managed_rule_group_statement {
                  + name        = "AWSManagedRulesLinuxRuleSet"
                  + vendor_name = "AWS"
                }
            }

          + visibility_config {
              + cloudwatch_metrics_enabled = true
              + metric_name                = "AWSManagedRulesLinuxRuleSet"
              + sampled_requests_enabled   = true
            }
        }
      + rule {
          + name     = "RateLimitersRuleGroup"
          + priority = 10

          + override_action {
              + none {}
            }

          + statement {
              + rule_group_reference_statement {
                  + arn = "arn:aws:wafv2:ca-central-1:687401027353:regional/rulegroup/RateLimitersGroup/51f888d4-a82d-4c56-8031-0da78ea6df8c"
                }
            }

          + visibility_config {
              + cloudwatch_metrics_enabled = true
              + metric_name                = "rate_limiters_rule_group"
              + sampled_requests_enabled   = false
            }
        }

        # (7 unchanged blocks hidden)
    }

Plan: 0 to add, 3 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_acm_certificate.form_viewer"]
WARN - plan.json - main - Missing Common Tags: ["aws_acm_certificate.form_viewer_maintenance_mode"]
WARN - plan.json - main - Missing Common Tags: ["aws_acm_certificate.forms_api"]
WARN - plan.json - main - Missing Common Tags: ["aws_alb_listener_rule.forms_api"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudfront_distribution.maintenance_mode"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_role.firehose_waf_logs"]
WARN - plan.json - main - Missing Common Tags: ["aws_kinesis_firehose_delivery_stream.firehose_waf_logs"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb.form_viewer"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_listener.form_viewer_http"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_listener.form_viewer_https"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_target_group.form_viewer_1"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_target_group.form_viewer_2"]
WARN - plan.json - main - Missing Common Tags: ["aws_lb_target_group.forms_api"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_bucket.maintenance_mode"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_object.maintenance_static_page_css_files[\"style.css\"]"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_object.maintenance_static_page_html_files[\"index-fr.html\"]"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_object.maintenance_static_page_html_files[\"index.html\"]"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_object.maintenance_static_page_ico_files[\"favicon.ico\"]"]
WARN - plan.json - main - Missing Common Tags: ["aws_s3_object.maintenance_static_page_svg_files[\"site-unavailable.svg\"]"]
WARN - plan.json - main - Missing Common Tags: ["aws_shield_protection.alb"]
WARN - plan.json - main - Missing Common Tags: ["aws_shield_protection.route53_hosted_zone[0]"]
WARN - plan.json - main - Missing...

Copy link

Staging: idp

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 1 to change, 0 to destroy
Show summary
CHANGE NAME
update aws_wafv2_web_acl.idp
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # aws_wafv2_web_acl.idp will be updated in-place
  ~ resource "aws_wafv2_web_acl" "idp" {
        id                          = "bab5476e-86d5-4718-aa69-55b379a8673d"
        name                        = "idp"
        tags                        = {
            "CostCentre" = "forms-platform-staging"
            "Terraform"  = "true"
        }
        # (9 unchanged attributes hidden)

      - rule {
          - name     = "AWSManagedRulesAmazonIpReputationList" -> null
          - priority = 10 -> null

          - override_action {
              - none {}
            }

          - statement {
              - managed_rule_group_statement {
                  - name        = "AWSManagedRulesAmazonIpReputationList" -> null
                  - vendor_name = "AWS" -> null
                    # (1 unchanged attribute hidden)
                }
            }

          - visibility_config {
              - cloudwatch_metrics_enabled = true -> null
              - metric_name                = "AWSManagedRulesAmazonIpReputationList" -> null
              - sampled_requests_enabled   = true -> null
            }
        }
      - rule {
          - name     = "AWSManagedRulesKnownBadInputsRuleSet" -> null
          - priority = 30 -> null

          - override_action {
              - none {}
            }

          - statement {
              - managed_rule_group_statement {
                  - name        = "AWSManagedRulesKnownBadInputsRuleSet" -> null
                  - vendor_name = "AWS" -> null
                    # (1 unchanged attribute hidden)
                }
            }

          - visibility_config {
              - cloudwatch_metrics_enabled = true -> null
              - metric_name                = "AWSManagedRulesKnownBadInputsRuleSet" -> null
              - sampled_requests_enabled   = true -> null
            }
        }
      - rule {
          - name     = "AWSManagedRulesLinuxRuleSet" -> null
          - priority = 40 -> null

          - override_action {
              - none {}
            }

          - statement {
              - managed_rule_group_statement {
                  - name        = "AWSManagedRulesLinuxRuleSet" -> null
                  - vendor_name = "AWS" -> null
                    # (1 unchanged attribute hidden)
                }
            }

          - visibility_config {
              - cloudwatch_metrics_enabled = true -> null
              - metric_name                = "AWSManagedRulesLinuxRuleSet" -> null
              - sampled_requests_enabled   = true -> null
            }
        }
      - rule {
          - name     = "RateLimitersRuleGroup" -> null
          - priority = 20 -> null

          - override_action {
              - none {}
            }

          - statement {
              - rule_group_reference_statement {
                  - arn = "arn:aws:wafv2:ca-central-1:687401027353:regional/rulegroup/RateLimitersGroupIdP/5ba7df46-85cc-4444-a43f-27e819bd9647" -> null

                  - rule_action_override {
                      - name = "BlanketRequestLimit" -> null

                      - action_to_use {
                          - count {
                            }
                        }
                    }
                  - rule_action_override {
                      - name = "PostRequestLimit" -> null

                      - action_to_use {
                          - count {
                            }
                        }
                    }
                }
            }

          - visibility_config {
              - cloudwatch_metrics_enabled = true -> null
              - metric_name                = "rate_limiters_rule_group" -> null
              - sampled_requests_enabled   = false -> null
            }
        }
      + rule {
          + name     = "AWSManagedRulesAmazonIpReputationList"
          + priority = 10

          + override_action {
              + none {}
            }

          + statement {
              + managed_rule_group_statement {
                  + name        = "AWSManagedRulesAmazonIpReputationList"
                  + vendor_name = "AWS"
                }
            }

          + visibility_config {
              + cloudwatch_metrics_enabled = true
              + metric_name                = "AWSManagedRulesAmazonIpReputationList"
              + sampled_requests_enabled   = true
            }
        }
      + rule {
          + name     = "AWSManagedRulesKnownBadInputsRuleSet"
          + priority = 30

          + override_action {
              + none {}
            }

          + statement {
              + managed_rule_group_statement {
                  + name        = "AWSManagedRulesKnownBadInputsRuleSet"
                  + vendor_name = "AWS"
                }
            }

          + visibility_config {
              + cloudwatch_metrics_enabled = true
              + metric_name                = "AWSManagedRulesKnownBadInputsRuleSet"
              + sampled_requests_enabled   = true
            }
        }
      + rule {
          + name     = "AWSManagedRulesLinuxRuleSet"
          + priority = 40

          + override_action {
              + none {}
            }

          + statement {
              + managed_rule_group_statement {
                  + name        = "AWSManagedRulesLinuxRuleSet"
                  + vendor_name = "AWS"
                }
            }

          + visibility_config {
              + cloudwatch_metrics_enabled = true
              + metric_name                = "AWSManagedRulesLinuxRuleSet"
              + sampled_requests_enabled   = true
            }
        }
      + rule {
          + name     = "RateLimitersRuleGroup"
          + priority = 20

          + override_action {
              + none {}
            }

          + statement {
              + rule_group_reference_statement {
                  + arn = "arn:aws:wafv2:ca-central-1:687401027353:regional/rulegroup/RateLimitersGroupIdP/5ba7df46-85cc-4444-a43f-27e819bd9647"
                }
            }

          + visibility_config {
              + cloudwatch_metrics_enabled = true
              + metric_name                = "rate_limiters_rule_group"
              + sampled_requests_enabled   = false
            }
        }

        # (7 unchanged blocks hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_alb_listener_rule.idp_protocol_version"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.idp_send_email"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_user.idp_send_email"]
WARN - plan.json - main - Missing Common Tags: ["aws_shield_protection.idp"]

23 tests, 19 passed, 4 warnings, 0 failures, 0 exceptions

Copy link

Staging: lambdas

✅   Terraform Init: success
✅   Terraform Validate: success
✅   Terraform Format: success
✅   Terraform Plan: success
✅   Conftest: success

Plan: 0 to add, 5 to change, 0 to destroy
Show summary
CHANGE NAME
update aws_lambda_event_source_mapping.api_audit_logs
aws_lambda_event_source_mapping.app_audit_logs
aws_lambda_event_source_mapping.reliability
aws_lambda_event_source_mapping.reprocess_submission
aws_lambda_event_source_mapping.vault_updated_item_stream
Show plan
Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # aws_lambda_event_source_mapping.api_audit_logs will be updated in-place
  ~ resource "aws_lambda_event_source_mapping" "api_audit_logs" {
        id                                 = "855c9101-f047-4e42-8fda-e69de5d3af54"
        tags                               = {}
      ~ tags_all                           = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
        # (23 unchanged attributes hidden)
    }

  # aws_lambda_event_source_mapping.app_audit_logs will be updated in-place
  ~ resource "aws_lambda_event_source_mapping" "app_audit_logs" {
        id                                 = "b0307781-e966-40b2-bf1d-73a432c2a854"
        tags                               = {}
      ~ tags_all                           = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
        # (23 unchanged attributes hidden)
    }

  # aws_lambda_event_source_mapping.reliability will be updated in-place
  ~ resource "aws_lambda_event_source_mapping" "reliability" {
        id                                 = "1f81bf31-9e9a-487e-8f53-cfd54d93316a"
        tags                               = {}
      ~ tags_all                           = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
        # (23 unchanged attributes hidden)
    }

  # aws_lambda_event_source_mapping.reprocess_submission will be updated in-place
  ~ resource "aws_lambda_event_source_mapping" "reprocess_submission" {
        id                                 = "e9bf5752-e38a-4dd8-9d2e-489597c00ef1"
        tags                               = {}
      ~ tags_all                           = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
        # (23 unchanged attributes hidden)
    }

  # aws_lambda_event_source_mapping.vault_updated_item_stream will be updated in-place
  ~ resource "aws_lambda_event_source_mapping" "vault_updated_item_stream" {
        id                                 = "6bfeda18-4b6d-4a3d-b54b-bbdebb8aa98e"
        tags                               = {}
      ~ tags_all                           = {
          + "CostCentre" = "forms-platform-staging"
          + "Terraform"  = "true"
        }
        # (23 unchanged attributes hidden)

        # (2 unchanged blocks hidden)
    }

Plan: 0 to add, 5 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: plan.tfplan

To perform exactly these actions, run the following command to apply:
    terraform apply "plan.tfplan"
Show Conftest results
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_event_rule.audit_logs_archiver_lambda_trigger"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_event_rule.form_archiver_lambda_trigger"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_event_rule.nagware_lambda_trigger"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_event_rule.reliability_dlq_lambda_trigger"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_event_rule.response_archiver_lambda_trigger"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.archive_form_templates"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.audit_logs"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.audit_logs_archiver"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.dead_letter_queue_consumer"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.nagware"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.reliability"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.response_archiver"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.submission"]
WARN - plan.json - main - Missing Common Tags: ["aws_cloudwatch_log_group.vault_integrity"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.lambda_dynamodb"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.lambda_kms"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.lambda_logging"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.lambda_rds"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.lambda_s3"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.lambda_secrets"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.lambda_sns"]
WARN - plan.json - main - Missing Common Tags: ["aws_iam_policy.lambda_sqs"]
WARN -...

Copy link
Contributor Author

renovate bot commented Oct 15, 2024

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

@bryan-robitaille bryan-robitaille enabled auto-merge (squash) October 21, 2024 13:15
@bryan-robitaille bryan-robitaille merged commit a493e1c into main Oct 21, 2024
33 checks passed
@bryan-robitaille bryan-robitaille deleted the renovate/all-minor branch October 21, 2024 13:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant