llavero icon indicating copy to clipboard operation
llavero copied to clipboard

Bump the npm_and_yarn group across 3 directories with 3 updates

Open dependabot[bot] opened this issue 8 months ago • 0 comments

Bumps the npm_and_yarn group with 3 updates in the / directory: aws-cdk-lib, electron and next. Bumps the npm_and_yarn group with 2 updates in the /apps/desktop directory: aws-cdk-lib and electron. Bumps the npm_and_yarn group with 2 updates in the /apps/web directory: aws-cdk-lib and next.

Updates aws-cdk-lib from 2.79.1 to 2.80.0

Release notes

Sourced from aws-cdk-lib's releases.

v2.80.0

⚠ BREAKING CHANGES

  • eks: A masters role is no longer provisioned by default. Use the mastersRole property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriate sts:AssumeRole permissions) to assume it.

Features

Bug Fixes


Alpha modules (2.80.0-alpha.0)

Changelog

Sourced from aws-cdk-lib's changelog.

2.80.0 (2023-05-19)

⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES

  • eks: A masters role is no longer provisioned by default. Use the mastersRole property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriate sts:AssumeRole permissions) to assume it.

Features

Bug Fixes

Commits
  • ecb59fd feat(apigateway): add grantExecute to API Methods (#25630)
  • b60876f feat(codepipeline-actions): add KMSEncryptionKeyARN for S3DeployAction (#24536)
  • f48515f docs(ssm): explain that SecretValue.ssmSecure() lives in core now (#25581)
  • 60a7e1e chore: npm-check-updates && yarn upgrade (#25631)
  • 28914bd docs(assertions): add more detail about migrating from the old assert library...
  • d7e263d feat(appsync): Add Private API support when creating a GraphqlApi (#25569)
  • a2e6324 chore: npm-check-updates && yarn upgrade (#25613)
  • 25d5d60 feat(cli): assets can now depend on stacks (#25536)
  • b885ece docs(assertions): update link to migration guide (#25602)
  • 83c4c36 feat(eks): alb controller include versions 2.4.2 - 2.5.1 (#25330)
  • Additional commits viewable in compare view

Updates electron from 23.3.13 to 24.8.5

Commits

Updates next from 13.5.4 to 14.1.1

Commits

Updates aws-cdk-lib from 2.79.1 to 2.80.0

Release notes

Sourced from aws-cdk-lib's releases.

v2.80.0

⚠ BREAKING CHANGES

  • eks: A masters role is no longer provisioned by default. Use the mastersRole property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriate sts:AssumeRole permissions) to assume it.

Features

Bug Fixes


Alpha modules (2.80.0-alpha.0)

Changelog

Sourced from aws-cdk-lib's changelog.

2.80.0 (2023-05-19)

⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES

  • eks: A masters role is no longer provisioned by default. Use the mastersRole property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriate sts:AssumeRole permissions) to assume it.

Features

Bug Fixes

Commits
  • ecb59fd feat(apigateway): add grantExecute to API Methods (#25630)
  • b60876f feat(codepipeline-actions): add KMSEncryptionKeyARN for S3DeployAction (#24536)
  • f48515f docs(ssm): explain that SecretValue.ssmSecure() lives in core now (#25581)
  • 60a7e1e chore: npm-check-updates && yarn upgrade (#25631)
  • 28914bd docs(assertions): add more detail about migrating from the old assert library...
  • d7e263d feat(appsync): Add Private API support when creating a GraphqlApi (#25569)
  • a2e6324 chore: npm-check-updates && yarn upgrade (#25613)
  • 25d5d60 feat(cli): assets can now depend on stacks (#25536)
  • b885ece docs(assertions): update link to migration guide (#25602)
  • 83c4c36 feat(eks): alb controller include versions 2.4.2 - 2.5.1 (#25330)
  • Additional commits viewable in compare view

Updates electron from 23.3.13 to 31.0.1

Commits

Updates aws-cdk-lib from 2.95.1 to 2.146.0

Release notes

Sourced from aws-cdk-lib's releases.

v2.80.0

⚠ BREAKING CHANGES

  • eks: A masters role is no longer provisioned by default. Use the mastersRole property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriate sts:AssumeRole permissions) to assume it.

Features

Bug Fixes


Alpha modules (2.80.0-alpha.0)

Changelog

Sourced from aws-cdk-lib's changelog.

2.80.0 (2023-05-19)

⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES

  • eks: A masters role is no longer provisioned by default. Use the mastersRole property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriate sts:AssumeRole permissions) to assume it.

Features

Bug Fixes

Commits
  • ecb59fd feat(apigateway): add grantExecute to API Methods (#25630)
  • b60876f feat(codepipeline-actions): add KMSEncryptionKeyARN for S3DeployAction (#24536)
  • f48515f docs(ssm): explain that SecretValue.ssmSecure() lives in core now (#25581)
  • 60a7e1e chore: npm-check-updates && yarn upgrade (#25631)
  • 28914bd docs(assertions): add more detail about migrating from the old assert library...
  • d7e263d feat(appsync): Add Private API support when creating a GraphqlApi (#25569)
  • a2e6324 chore: npm-check-updates && yarn upgrade (#25613)
  • 25d5d60 feat(cli): assets can now depend on stacks (#25536)
  • b885ece docs(assertions): update link to migration guide (#25602)
  • 83c4c36 feat(eks): alb controller include versions 2.4.2 - 2.5.1 (#25330)
  • Additional commits viewable in compare view

Updates next from 13.5.4 to 14.1.1

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.

dependabot[bot] avatar Jun 17 '24 23:06 dependabot[bot]