llavero
llavero copied to clipboard
Bump the npm_and_yarn group across 3 directories with 3 updates
Bumps the npm_and_yarn group with 3 updates in the / directory: aws-cdk-lib, electron and next. Bumps the npm_and_yarn group with 2 updates in the /apps/desktop directory: aws-cdk-lib and electron. Bumps the npm_and_yarn group with 2 updates in the /apps/web directory: aws-cdk-lib and next.
Updates aws-cdk-lib
from 2.79.1 to 2.80.0
Release notes
Sourced from aws-cdk-lib's releases.
v2.80.0
⚠ BREAKING CHANGES
- eks: A masters role is no longer provisioned by default. Use the
mastersRole
property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriatests:AssumeRole
permissions) to assume it.Features
- apigateway: add grantExecute to API Methods (#25630) (ecb59fd)
- appmesh: access log format support for app mesh (#25229) (c4b00be)
- appsync: Add Private API support when creating a GraphqlApi (#25569) (d7e263d)
- cfnspec: cloudformation spec v122.0.0 (#25555) (5ccc569)
- cli: assets can now depend on stacks (#25536) (25d5d60)
- cli: logging can be corked (#25644) (0643020), closes #25536
- codepipeline-actions: add KMSEncryptionKeyARN for S3DeployAction (#24536) (b60876f), closes #24535
- eks: alb controller include versions 2.4.2 - 2.5.1 (#25330) (83c4c36), closes #25307
- msk: Kafka version 3.4.0 (#25557) (6317518), closes #25522
- scheduler: schedule expression construct (#25422) (97a698e)
Bug Fixes
- bootstrap: bootstrap doesn't work in non-aws partitions anymore (revert security hub finding fix) (#25540) (8854739), closes aws/aws-cdk#19380 #25272 #25273 #25507
- eks: overly permissive trust policies (#25473) (51f0193). We would like to thank
@twelvemo
and@stefreak
for reporting this issue.
Alpha modules (2.80.0-alpha.0)
Changelog
Sourced from aws-cdk-lib's changelog.
2.80.0 (2023-05-19)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
- eks: A masters role is no longer provisioned by default. Use the
mastersRole
property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriatests:AssumeRole
permissions) to assume it.Features
- apigateway: add grantExecute to API Methods (#25630) (ecb59fd)
- appmesh: access log format support for app mesh (#25229) (c4b00be)
- appsync: Add Private API support when creating a GraphqlApi (#25569) (d7e263d)
- cfnspec: cloudformation spec v122.0.0 (#25555) (5ccc569)
- cli: assets can now depend on stacks (#25536) (25d5d60)
- cli: logging can be corked (#25644) (0643020), closes #25536
- codepipeline-actions: add KMSEncryptionKeyARN for S3DeployAction (#24536) (b60876f), closes #24535
- eks: alb controller include versions 2.4.2 - 2.5.1 (#25330) (83c4c36), closes #25307
- msk: Kafka version 3.4.0 (#25557) (6317518), closes #25522
- scheduler: schedule expression construct (#25422) (97a698e)
Bug Fixes
- bootstrap: bootstrap doesn't work in non-aws partitions anymore (revert security hub finding fix) (#25540) (8854739), closes aws/aws-cdk#19380 #25272 #25273 #25507
- eks: overly permissive trust policies (#25473) (51f0193). We would like to thank
@twelvemo
and@stefreak
for reporting this issue.
Commits
ecb59fd
feat(apigateway): add grantExecute to API Methods (#25630)b60876f
feat(codepipeline-actions): add KMSEncryptionKeyARN for S3DeployAction (#24536)f48515f
docs(ssm): explain that SecretValue.ssmSecure() lives in core now (#25581)60a7e1e
chore: npm-check-updates && yarn upgrade (#25631)28914bd
docs(assertions): add more detail about migrating from the old assert library...d7e263d
feat(appsync): Add Private API support when creating a GraphqlApi (#25569)a2e6324
chore: npm-check-updates && yarn upgrade (#25613)25d5d60
feat(cli): assets can now depend on stacks (#25536)b885ece
docs(assertions): update link to migration guide (#25602)83c4c36
feat(eks): alb controller include versions 2.4.2 - 2.5.1 (#25330)- Additional commits viewable in compare view
Updates electron
from 23.3.13 to 24.8.5
Commits
543f7c3
chore: cherry-pick 3fbd1dca6a4d from libvpx (#40025)e51dee4
fix: use generic capturer to list both screens and windows when possible (#39...384f44d
ci: fix linux builds of forks (#39942)edb117a
build: use afs on aks instead of circle cache (#39913)3f864b2
build: fixup autoninja (#39901)97bf8c8
build: run on circle hosts for forks (#39864)4a9b367
build: use aks backed runners for linux builds (#39837)0508e25
chore: cherry-pick b2eab7500a18 from chromium (#39826)0641412
fix: ensure app load is limited to real asar files when appropriate (#39810)c574fed
chore: cherry-pick 3 changes from Release-3-M116 (#39757)- Additional commits viewable in compare view
Updates next
from 13.5.4 to 14.1.1
Commits
5f59ee5
v14.1.1f48b90b
even more7f789f4
more timeoutab71c4c
update timeout75f60d9
update trigger release workflow74b3f0f
Server Action tests (#62655)a6946b6
Backport metadata fixes (#62663)4002f4b
Fix draft mode invariant (#62121)7dbf6f8
fix: babel usage with next/image (#61835)3efc842
Fix next/server apit push alias for ESM pkg (#61721)- Additional commits viewable in compare view
Updates aws-cdk-lib
from 2.79.1 to 2.80.0
Release notes
Sourced from aws-cdk-lib's releases.
v2.80.0
⚠ BREAKING CHANGES
- eks: A masters role is no longer provisioned by default. Use the
mastersRole
property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriatests:AssumeRole
permissions) to assume it.Features
- apigateway: add grantExecute to API Methods (#25630) (ecb59fd)
- appmesh: access log format support for app mesh (#25229) (c4b00be)
- appsync: Add Private API support when creating a GraphqlApi (#25569) (d7e263d)
- cfnspec: cloudformation spec v122.0.0 (#25555) (5ccc569)
- cli: assets can now depend on stacks (#25536) (25d5d60)
- cli: logging can be corked (#25644) (0643020), closes #25536
- codepipeline-actions: add KMSEncryptionKeyARN for S3DeployAction (#24536) (b60876f), closes #24535
- eks: alb controller include versions 2.4.2 - 2.5.1 (#25330) (83c4c36), closes #25307
- msk: Kafka version 3.4.0 (#25557) (6317518), closes #25522
- scheduler: schedule expression construct (#25422) (97a698e)
Bug Fixes
- bootstrap: bootstrap doesn't work in non-aws partitions anymore (revert security hub finding fix) (#25540) (8854739), closes aws/aws-cdk#19380 #25272 #25273 #25507
- eks: overly permissive trust policies (#25473) (51f0193). We would like to thank
@twelvemo
and@stefreak
for reporting this issue.
Alpha modules (2.80.0-alpha.0)
Changelog
Sourced from aws-cdk-lib's changelog.
2.80.0 (2023-05-19)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
- eks: A masters role is no longer provisioned by default. Use the
mastersRole
property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriatests:AssumeRole
permissions) to assume it.Features
- apigateway: add grantExecute to API Methods (#25630) (ecb59fd)
- appmesh: access log format support for app mesh (#25229) (c4b00be)
- appsync: Add Private API support when creating a GraphqlApi (#25569) (d7e263d)
- cfnspec: cloudformation spec v122.0.0 (#25555) (5ccc569)
- cli: assets can now depend on stacks (#25536) (25d5d60)
- cli: logging can be corked (#25644) (0643020), closes #25536
- codepipeline-actions: add KMSEncryptionKeyARN for S3DeployAction (#24536) (b60876f), closes #24535
- eks: alb controller include versions 2.4.2 - 2.5.1 (#25330) (83c4c36), closes #25307
- msk: Kafka version 3.4.0 (#25557) (6317518), closes #25522
- scheduler: schedule expression construct (#25422) (97a698e)
Bug Fixes
- bootstrap: bootstrap doesn't work in non-aws partitions anymore (revert security hub finding fix) (#25540) (8854739), closes aws/aws-cdk#19380 #25272 #25273 #25507
- eks: overly permissive trust policies (#25473) (51f0193). We would like to thank
@twelvemo
and@stefreak
for reporting this issue.
Commits
ecb59fd
feat(apigateway): add grantExecute to API Methods (#25630)b60876f
feat(codepipeline-actions): add KMSEncryptionKeyARN for S3DeployAction (#24536)f48515f
docs(ssm): explain that SecretValue.ssmSecure() lives in core now (#25581)60a7e1e
chore: npm-check-updates && yarn upgrade (#25631)28914bd
docs(assertions): add more detail about migrating from the old assert library...d7e263d
feat(appsync): Add Private API support when creating a GraphqlApi (#25569)a2e6324
chore: npm-check-updates && yarn upgrade (#25613)25d5d60
feat(cli): assets can now depend on stacks (#25536)b885ece
docs(assertions): update link to migration guide (#25602)83c4c36
feat(eks): alb controller include versions 2.4.2 - 2.5.1 (#25330)- Additional commits viewable in compare view
Updates electron
from 23.3.13 to 31.0.1
Commits
543f7c3
chore: cherry-pick 3fbd1dca6a4d from libvpx (#40025)e51dee4
fix: use generic capturer to list both screens and windows when possible (#39...384f44d
ci: fix linux builds of forks (#39942)edb117a
build: use afs on aks instead of circle cache (#39913)3f864b2
build: fixup autoninja (#39901)97bf8c8
build: run on circle hosts for forks (#39864)4a9b367
build: use aks backed runners for linux builds (#39837)0508e25
chore: cherry-pick b2eab7500a18 from chromium (#39826)0641412
fix: ensure app load is limited to real asar files when appropriate (#39810)c574fed
chore: cherry-pick 3 changes from Release-3-M116 (#39757)- Additional commits viewable in compare view
Updates aws-cdk-lib
from 2.95.1 to 2.146.0
Release notes
Sourced from aws-cdk-lib's releases.
v2.80.0
⚠ BREAKING CHANGES
- eks: A masters role is no longer provisioned by default. Use the
mastersRole
property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriatests:AssumeRole
permissions) to assume it.Features
- apigateway: add grantExecute to API Methods (#25630) (ecb59fd)
- appmesh: access log format support for app mesh (#25229) (c4b00be)
- appsync: Add Private API support when creating a GraphqlApi (#25569) (d7e263d)
- cfnspec: cloudformation spec v122.0.0 (#25555) (5ccc569)
- cli: assets can now depend on stacks (#25536) (25d5d60)
- cli: logging can be corked (#25644) (0643020), closes #25536
- codepipeline-actions: add KMSEncryptionKeyARN for S3DeployAction (#24536) (b60876f), closes #24535
- eks: alb controller include versions 2.4.2 - 2.5.1 (#25330) (83c4c36), closes #25307
- msk: Kafka version 3.4.0 (#25557) (6317518), closes #25522
- scheduler: schedule expression construct (#25422) (97a698e)
Bug Fixes
- bootstrap: bootstrap doesn't work in non-aws partitions anymore (revert security hub finding fix) (#25540) (8854739), closes aws/aws-cdk#19380 #25272 #25273 #25507
- eks: overly permissive trust policies (#25473) (51f0193). We would like to thank
@twelvemo
and@stefreak
for reporting this issue.
Alpha modules (2.80.0-alpha.0)
Changelog
Sourced from aws-cdk-lib's changelog.
2.80.0 (2023-05-19)
⚠ BREAKING CHANGES TO EXPERIMENTAL FEATURES
- eks: A masters role is no longer provisioned by default. Use the
mastersRole
property to explicitly pass a role that needs cluster access. In addition, the creation role no longer allows any identity (with the appropriatests:AssumeRole
permissions) to assume it.Features
- apigateway: add grantExecute to API Methods (#25630) (ecb59fd)
- appmesh: access log format support for app mesh (#25229) (c4b00be)
- appsync: Add Private API support when creating a GraphqlApi (#25569) (d7e263d)
- cfnspec: cloudformation spec v122.0.0 (#25555) (5ccc569)
- cli: assets can now depend on stacks (#25536) (25d5d60)
- cli: logging can be corked (#25644) (0643020), closes #25536
- codepipeline-actions: add KMSEncryptionKeyARN for S3DeployAction (#24536) (b60876f), closes #24535
- eks: alb controller include versions 2.4.2 - 2.5.1 (#25330) (83c4c36), closes #25307
- msk: Kafka version 3.4.0 (#25557) (6317518), closes #25522
- scheduler: schedule expression construct (#25422) (97a698e)
Bug Fixes
- bootstrap: bootstrap doesn't work in non-aws partitions anymore (revert security hub finding fix) (#25540) (8854739), closes aws/aws-cdk#19380 #25272 #25273 #25507
- eks: overly permissive trust policies (#25473) (51f0193). We would like to thank
@twelvemo
and@stefreak
for reporting this issue.
Commits
ecb59fd
feat(apigateway): add grantExecute to API Methods (#25630)b60876f
feat(codepipeline-actions): add KMSEncryptionKeyARN for S3DeployAction (#24536)f48515f
docs(ssm): explain that SecretValue.ssmSecure() lives in core now (#25581)60a7e1e
chore: npm-check-updates && yarn upgrade (#25631)28914bd
docs(assertions): add more detail about migrating from the old assert library...d7e263d
feat(appsync): Add Private API support when creating a GraphqlApi (#25569)a2e6324
chore: npm-check-updates && yarn upgrade (#25613)25d5d60
feat(cli): assets can now depend on stacks (#25536)b885ece
docs(assertions): update link to migration guide (#25602)83c4c36
feat(eks): alb controller include versions 2.4.2 - 2.5.1 (#25330)- Additional commits viewable in compare view
Updates next
from 13.5.4 to 14.1.1
Commits
5f59ee5
v14.1.1f48b90b
even more7f789f4
more timeoutab71c4c
update timeout75f60d9
update trigger release workflow74b3f0f
Server Action tests (#62655)a6946b6
Backport metadata fixes (#62663)4002f4b
Fix draft mode invariant (#62121)7dbf6f8
fix: babel usage with next/image (#61835)3efc842
Fix next/server apit push alias for ESM pkg (#61721)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebase
will rebase this PR -
@dependabot recreate
will recreate this PR, overwriting any edits that have been made to it -
@dependabot merge
will merge this PR after your CI passes on it -
@dependabot squash and merge
will squash and merge this PR after your CI passes on it -
@dependabot cancel merge
will cancel a previously requested merge and block automerging -
@dependabot reopen
will reopen this PR if it is closed -
@dependabot close
will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditions
will show all of the ignore conditions of the specified dependency -
@dependabot ignore <dependency name> major version
will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) -
@dependabot ignore <dependency name> minor version
will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) -
@dependabot ignore <dependency name>
will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) -
@dependabot unignore <dependency name>
will remove all of the ignore conditions of the specified dependency -
@dependabot unignore <dependency name> <ignore condition>
will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.