fix(deps): update dependency prettier to v2.8.8#413
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
fix(deps): update dependency prettier to v2.8.8#413renovate[bot] wants to merge 1 commit intomasterfrom
renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
Plan Result (sbox-00-genesis)It failed to parse the result. Details (Click me)Changes to Outputs:
- result = {
- azurerm_key_vault_id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/genesis-rg/providers/Microsoft.KeyVault/vaults/dtssharedservicessboxkv"
} -> null
You can apply this plan to save these new output values to the Terraform
state, without changing any real infrastructure.
|
Plan Result (sbox-07-network-rg) |
Plan Result (sbox-01-network)
Change Result (Click me) # module.network.azurerm_subnet.postgresql_subnet will be updated in-place
~ resource "azurerm_subnet" "postgresql_subnet" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-network-rg/providers/Microsoft.Network/virtualNetworks/ss-sbox-vnet/subnets/postgresql"
name = "postgresql"
~ service_endpoints = [
- "Microsoft.Storage",
]
# (8 unchanged attributes hidden)
# (1 unchanged block hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy. |
Plan Result (sbox-05-mis) |
Plan Result (sbox-aks)
Change Result (Click me) # module.kubernetes["00"].azurerm_kubernetes_cluster.kubernetes_cluster will be updated in-place
~ resource "azurerm_kubernetes_cluster" "kubernetes_cluster" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-00-aks"
~ kubernetes_version = "1.25.6" -> "1.25"
name = "ss-sbox-00-aks"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (28 unchanged attributes hidden)
~ default_node_pool {
name = "system"
~ orchestrator_version = "1.25.6" -> "1.25"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (22 unchanged attributes hidden)
}
# (8 unchanged blocks hidden)
}
# module.kubernetes["00"].azurerm_kubernetes_cluster_node_pool.additional_node_pools["linux"] will be updated in-place
~ resource "azurerm_kubernetes_cluster_node_pool" "additional_node_pools" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-00-aks/agentPools/linux"
name = "linux"
~ orchestrator_version = "1.25.6" -> "1.25"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (25 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
# module.kubernetes["00"].azurerm_kubernetes_cluster_node_pool.additional_node_pools["msnode"] will be updated in-place
~ resource "azurerm_kubernetes_cluster_node_pool" "additional_node_pools" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-00-aks/agentPools/msnode"
name = "msnode"
~ orchestrator_version = "1.25.6" -> "1.25"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (25 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
# module.kubernetes["00"].azurerm_monitor_diagnostic_setting.kubernetes_cluster_diagnostic_setting[0] will be updated in-place
~ resource "azurerm_monitor_diagnostic_setting" "kubernetes_cluster_diagnostic_setting" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-00-aks|DiagLogAnalytics"
+ log_analytics_destination_type = "AzureDiagnostics"
name = "DiagLogAnalytics"
# (2 unchanged attributes hidden)
- log {
- category = "cloud-controller-manager" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "cluster-autoscaler" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "csi-azuredisk-controller" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "csi-azurefile-controller" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "csi-snapshot-controller" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "guard" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-apiserver" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-audit" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-audit-admin" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-controller-manager" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-scheduler" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
+ log {
+ category = "cluster-autoscaler"
+ enabled = true
}
+ log {
+ category = "guard"
+ enabled = true
}
+ log {
+ category = "kube-apiserver"
+ enabled = true
}
+ log {
+ category = "kube-audit-admin"
+ enabled = false
}
+ log {
+ category = "kube-controller-manager"
+ enabled = true
}
+ log {
+ category = "kube-scheduler"
+ enabled = true
}
# (6 unchanged blocks hidden)
}
# module.kubernetes["01"].azurerm_kubernetes_cluster.kubernetes_cluster will be updated in-place
~ resource "azurerm_kubernetes_cluster" "kubernetes_cluster" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-01-aks"
~ kubernetes_version = "1.25.6" -> "1.25"
name = "ss-sbox-01-aks"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (28 unchanged attributes hidden)
~ default_node_pool {
name = "system"
~ orchestrator_version = "1.25.6" -> "1.25"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (22 unchanged attributes hidden)
}
# (8 unchanged blocks hidden)
}
# module.kubernetes["01"].azurerm_kubernetes_cluster_node_pool.additional_node_pools["linux"] will be updated in-place
~ resource "azurerm_kubernetes_cluster_node_pool" "additional_node_pools" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-01-aks/agentPools/linux"
name = "linux"
~ orchestrator_version = "1.25.6" -> "1.25"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (25 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
# module.kubernetes["01"].azurerm_kubernetes_cluster_node_pool.additional_node_pools["msnode"] will be updated in-place
~ resource "azurerm_kubernetes_cluster_node_pool" "additional_node_pools" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-01-aks/agentPools/msnode"
name = "msnode"
~ orchestrator_version = "1.25.6" -> "1.25"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (25 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
# module.kubernetes["01"].azurerm_monitor_diagnostic_setting.kubernetes_cluster_diagnostic_setting[0] will be updated in-place
~ resource "azurerm_monitor_diagnostic_setting" "kubernetes_cluster_diagnostic_setting" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-01-aks|DiagLogAnalytics"
+ log_analytics_destination_type = "AzureDiagnostics"
name = "DiagLogAnalytics"
# (2 unchanged attributes hidden)
- log {
- category = "cloud-controller-manager" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "cluster-autoscaler" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "csi-azuredisk-controller" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "csi-azurefile-controller" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "csi-snapshot-controller" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "guard" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-apiserver" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-audit" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-audit-admin" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-controller-manager" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
- log {
- category = "kube-scheduler" -> null
- enabled = true -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
+ log {
+ category = "cluster-autoscaler"
+ enabled = true
}
+ log {
+ category = "guard"
+ enabled = true
}
+ log {
+ category = "kube-apiserver"
+ enabled = true
}
+ log {
+ category = "kube-audit-admin"
+ enabled = false
}
+ log {
+ category = "kube-controller-manager"
+ enabled = true
}
+ log {
+ category = "kube-scheduler"
+ enabled = true
}
# (6 unchanged blocks hidden)
}
Plan: 0 to add, 8 to change, 0 to destroy. |
29d52d5 to
b2d8c63
Compare
b2d8c63 to
93b1f41
Compare
93b1f41 to
fbc3416
Compare
fbc3416 to
789fa51
Compare
Plan Result (482: Aks_sbox - DeployInfrastructure)
Change Result (Click me) # azurerm_resource_group.disks_resource_group will be created
+ resource "azurerm_resource_group" "disks_resource_group" {
+ id = (known after apply)
+ location = "uksouth"
+ name = "disks-sbox-rg"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "Low"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
}
}
# azurerm_role_assignment.disk will be created
+ resource "azurerm_role_assignment" "disk" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "ba206872-8722-4375-bf4d-a28c39dff414"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Virtual Machine Contributor"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
Plan: 2 to add, 0 to change, 0 to destroy.ℹ️ Objects have changed outside of TerraformThis feature was introduced from Terraform v0.15.4. Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# azurerm_resource_group.disks_resource_group has been deleted
- resource "azurerm_resource_group" "disks_resource_group" {
- id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/disks-sbox-rg" -> null
name = "disks-sbox-rg"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (2 unchanged attributes hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the |
Plan Result (482: Genesis_prod - Genesis) |
Plan Result (482: Network_prod - NetworkRg) |
Plan Result (482: Genesis_ptl - Genesis)
Change Result (Click me) # module.genesis.azurerm_resource_group.genesis_resource_group will be updated in-place
~ resource "azurerm_resource_group" "genesis_resource_group" {
id = "/subscriptions/6c4d2513-a873-41b4-afdd-b05a33206631/resourceGroups/genesis-rg"
name = "genesis-rg"
~ tags = {
+ "application" = "core"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "High"
+ "environment" = "production"
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy. |
Plan Result (482: Network_ptl - NetworkRg) |
Plan Result (482: Network_prod - DeployInfrastructure)
|
Plan Result (482: Network_ptl - DeployInfrastructure) |
Plan Result (482: Managed_Identity_prod - Managed_Identity)
Change Result (Click me) # azurerm_resource_group.application-mi will be updated in-place
~ resource "azurerm_resource_group" "application-mi" {
id = "/subscriptions/5ca62022-6aa2-4cee-aaa7-e7536c8d566c/resourceGroups/managed-identities-prod-rg"
name = "managed-identities-prod-rg"
~ tags = {
+ "application" = "core"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "High"
+ "environment" = "production"
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
|
Plan Result (482: Managed_Identity_ptl - Managed_Identity)
Change Result (Click me) # azurerm_resource_group.application-mi will be updated in-place
~ resource "azurerm_resource_group" "application-mi" {
id = "/subscriptions/6c4d2513-a873-41b4-afdd-b05a33206631/resourceGroups/managed-identities-ptl-rg"
name = "managed-identities-ptl-rg"
~ tags = {
+ "application" = "core"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "High"
+ "environment" = "production"
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
|
371fc8d to
2f06d9e
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.8.4→2.8.8Release Notes
prettier/prettier (prettier)
v2.8.8Compare Source
This version is a republished version of v2.8.7.
A bad version was accidentally published and it can't be unpublished, apologies for the churn.
v2.8.7Compare Source
diff
Allow multiple decorators on same getter/setter (#14584 by @fisker)
v2.8.6Compare Source
diff
Allow decorators on private members and class expressions (#14548 by @fisker)
v2.8.5Compare Source
diff
Support TypeScript 5.0 (#14391 by @fisker, #13819 by @fisker, @sosukesuzuki)
TypeScript 5.0 introduces two new syntactic features:
constmodifiers for type parametersexport type *declarationsAdd missing parentheses for decorator (#14393 by @fisker)
Add parentheses for
TypeofTypeAnnotationto improve readability (#14458 by @fisker)Support
max_line_length=offwhen parsing.editorconfig(#14516 by @josephfrazier)If an .editorconfig file is in your project and it sets
max_line_length=offfor the file you're formatting,it will be interpreted as a
printWidthofInfinityrather than being ignored(which previously resulted in the default
printWidthof 80 being applied, if not overridden by Prettier-specific configuration).Configuration
📅 Schedule: Branch creation - "after 7am and before 11am every weekday" in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.