-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency hashicorp/terraform to v1.9.1 - abandoned #123
Conversation
Plan Result (stg)
Change Result (Click me) # module.application_insights.azurerm_monitor_activity_log_alert.main has moved to module.application_insights.azurerm_monitor_activity_log_alert.main[0]
resource "azurerm_monitor_activity_log_alert" "main" {
id = "/subscriptions/74dacd4f-a248-45bb-a2f0-af700dc4cf68/resourceGroups/toffee-shared-infrastructure-stg/providers/Microsoft.Insights/activityLogAlerts/Application Insights daily cap reached - toffee-stg"
name = "Application Insights daily cap reached - toffee-stg"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "staging"
"managedBy" = "Platform Operations"
}
# (5 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
Plan: 0 to add, 0 to change, 0 to destroy. |
Plan Result (prod)
Change Result (Click me) # module.application_insights.azurerm_monitor_activity_log_alert.main has moved to module.application_insights.azurerm_monitor_activity_log_alert.main[0]
resource "azurerm_monitor_activity_log_alert" "main" {
id = "/subscriptions/5ca62022-6aa2-4cee-aaa7-e7536c8d566c/resourceGroups/toffee-shared-infrastructure-prod/providers/Microsoft.Insights/activityLogAlerts/Application Insights daily cap reached - toffee-prod"
name = "Application Insights daily cap reached - toffee-prod"
tags = {
"application" = "core"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "production"
"managedBy" = "Platform Operations"
}
# (5 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
Plan: 0 to add, 0 to change, 0 to destroy. |
Plan Result (sbox)
Change Result (Click me) # azurerm_key_vault_secret.appInsights-InstrumentationKey will be created
+ resource "azurerm_key_vault_secret" "appInsights-InstrumentationKey" {
+ id = (known after apply)
+ key_vault_id = (known after apply)
+ name = "appInsights-InstrumentationKey"
+ resource_id = (known after apply)
+ resource_versionless_id = (known after apply)
+ value = (sensitive value)
+ version = (known after apply)
+ versionless_id = (known after apply)
}
# azurerm_resource_group.shared_resource_group will be created
+ resource "azurerm_resource_group" "shared_resource_group" {
+ id = (known after apply)
+ location = "uksouth"
+ name = "apple-shared-infrastructure-sbox"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
}
# azurerm_role_assignment.keda_servicebus_data_receiver will be created
+ resource "azurerm_role_assignment" "keda_servicebus_data_receiver" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "b305926a-0ed4-47b2-9fd4-0aecf1212537"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Azure Service Bus Data Receiver"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
# azurerm_role_assignment.platops_servicebus_data_owner will be created
+ resource "azurerm_role_assignment" "platops_servicebus_data_owner" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "e7ea2042-4ced-45dd-8ae3-e051c6551789"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Azure Service Bus Data Owner"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
# azurerm_role_assignment.toffee_servicebus_data_receiver will be created
+ resource "azurerm_role_assignment" "toffee_servicebus_data_receiver" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = (known after apply)
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Azure Service Bus Data Receiver"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
# azurerm_servicebus_queue.this will be created
+ resource "azurerm_servicebus_queue" "this" {
+ auto_delete_on_idle = (known after apply)
+ dead_lettering_on_message_expiration = false
+ default_message_ttl = (known after apply)
+ duplicate_detection_history_time_window = (known after apply)
+ enable_batched_operations = true
+ enable_express = false
+ enable_partitioning = false
+ id = (known after apply)
+ lock_duration = (known after apply)
+ max_delivery_count = 10
+ max_message_size_in_kilobytes = (known after apply)
+ max_size_in_megabytes = (known after apply)
+ name = "recipes"
+ namespace_id = (known after apply)
+ requires_duplicate_detection = false
+ requires_session = false
+ status = "Active"
}
# module.application_insights.azurerm_application_insights.this will be created
+ resource "azurerm_application_insights" "this" {
+ app_id = (known after apply)
+ application_type = "web"
+ connection_string = (sensitive value)
+ daily_data_cap_in_gb = 50
+ daily_data_cap_notifications_disabled = true
+ disable_ip_masking = false
+ force_customer_storage_for_profiler = false
+ id = (known after apply)
+ instrumentation_key = (sensitive value)
+ internet_ingestion_enabled = true
+ internet_query_enabled = true
+ local_authentication_disabled = false
+ location = "uksouth"
+ name = "apple-sbox"
+ resource_group_name = "apple-shared-infrastructure-sbox"
+ retention_in_days = 90
+ sampling_percentage = 100
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ workspace_id = "/subscriptions/bf308a5c-0624-4334-8ff8-8dca9fd43783/resourceGroups/oms-automation/providers/Microsoft.OperationalInsights/workspaces/hmcts-sandbox"
}
# module.application_insights.azurerm_monitor_activity_log_alert.main[0] will be created
# (moved from module.application_insights.azurerm_monitor_activity_log_alert.main)
+ resource "azurerm_monitor_activity_log_alert" "main" {
+ description = "Monitors for application insight reaching it's daily cap."
+ enabled = true
+ id = (known after apply)
+ location = "global"
+ name = "Application Insights daily cap reached - apple-sbox"
+ resource_group_name = "apple-shared-infrastructure-sbox"
+ scopes = (known after apply)
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ action {
+ action_group_id = "/subscriptions/6c4d2513-a873-41b4-afdd-b05a33206631/resourceGroups/sds-alerts-slack-ptl/providers/Microsoft.Insights/actiongroups/sds-alerts-slack-warning-alerts"
+ webhook_properties = {
+ "from" = "terraform"
+ "slackChannelId" = "C8SR5CAMU"
}
}
+ criteria {
+ category = "Administrative"
+ level = "Warning"
+ operation_name = "Microsoft.Insights/Components/DailyCapReached/Action"
+ resource_id = (known after apply)
+ resource_health (known after apply)
+ service_health (known after apply)
}
}
# module.servicebus-namespace.azurerm_servicebus_namespace.servicebus_namespace will be created
+ resource "azurerm_servicebus_namespace" "servicebus_namespace" {
+ capacity = 0
+ default_primary_connection_string = (sensitive value)
+ default_primary_key = (sensitive value)
+ default_secondary_connection_string = (sensitive value)
+ default_secondary_key = (sensitive value)
+ endpoint = (known after apply)
+ id = (known after apply)
+ local_auth_enabled = true
+ location = "uksouth"
+ minimum_tls_version = (known after apply)
+ name = "apple-servicebus-sbox"
+ premium_messaging_partitions = 0
+ public_network_access_enabled = true
+ resource_group_name = "apple-shared-infrastructure-sbox"
+ sku = "Basic"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ zone_redundant = false
+ network_rule_set (known after apply)
}
# module.servicebus-namespace.azurerm_servicebus_namespace_authorization_rule.send_listen_auth_rule will be created
+ resource "azurerm_servicebus_namespace_authorization_rule" "send_listen_auth_rule" {
+ id = (known after apply)
+ listen = true
+ manage = false
+ name = "SendAndListenSharedAccessKey"
+ namespace_id = (known after apply)
+ primary_connection_string = (sensitive value)
+ primary_connection_string_alias = (sensitive value)
+ primary_key = (sensitive value)
+ secondary_connection_string = (sensitive value)
+ secondary_connection_string_alias = (sensitive value)
+ secondary_key = (sensitive value)
+ send = true
}
# module.vault.azurerm_key_vault.kv will be created
+ resource "azurerm_key_vault" "kv" {
+ access_policy = (known after apply)
+ enabled_for_deployment = true
+ enabled_for_disk_encryption = true
+ enabled_for_template_deployment = true
+ id = (known after apply)
+ location = "uksouth"
+ name = "applesi-sbox"
+ public_network_access_enabled = true
+ purge_protection_enabled = true
+ resource_group_name = "apple-shared-infrastructure-sbox"
+ sku_name = "standard"
+ soft_delete_retention_days = 90
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
+ vault_uri = (known after apply)
+ contact (known after apply)
+ network_acls {
+ bypass = "AzureServices"
+ default_action = "Allow"
}
}
# module.vault.azurerm_key_vault_access_policy.creator_access_policy will be created
+ resource "azurerm_key_vault_access_policy" "creator_access_policy" {
+ certificate_permissions = [
+ "Create",
+ "Delete",
+ "DeleteIssuers",
+ "Get",
+ "GetIssuers",
+ "Import",
+ "List",
+ "ListIssuers",
+ "SetIssuers",
+ "Update",
+ "ManageContacts",
+ "ManageIssuers",
]
+ id = (known after apply)
+ key_permissions = [
+ "Create",
+ "List",
+ "Get",
+ "Delete",
+ "Update",
+ "Import",
+ "Backup",
+ "Restore",
+ "Decrypt",
+ "Encrypt",
+ "UnwrapKey",
+ "WrapKey",
+ "Sign",
+ "Verify",
+ "GetRotationPolicy",
]
+ key_vault_id = (known after apply)
+ object_id = "5356a0e7-324e-4efa-970b-4b4aec3f0ba3"
+ secret_permissions = [
+ "Set",
+ "List",
+ "Get",
+ "Delete",
+ "Recover",
+ "Purge",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_key_vault_access_policy.developer[0] will be created
+ resource "azurerm_key_vault_access_policy" "developer" {
+ certificate_permissions = [
+ "Get",
+ "List",
]
+ id = (known after apply)
+ key_permissions = [
+ "Get",
+ "List",
]
+ key_vault_id = (known after apply)
+ object_id = "7bde62e7-b39f-487c-95c9-b4c794fdbb96"
+ secret_permissions = [
+ "Get",
+ "List",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_key_vault_access_policy.implicit_managed_identity_access_policy[0] will be created
+ resource "azurerm_key_vault_access_policy" "implicit_managed_identity_access_policy" {
+ certificate_permissions = [
+ "Get",
+ "List",
]
+ id = (known after apply)
+ key_permissions = [
+ "Get",
+ "List",
]
+ key_vault_id = (known after apply)
+ object_id = (known after apply)
+ secret_permissions = [
+ "Get",
+ "List",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_key_vault_access_policy.managed_identity_access_policy["60ab1441-a8a9-4990-aa30-c94e9f0b047b"] will be created
+ resource "azurerm_key_vault_access_policy" "managed_identity_access_policy" {
+ certificate_permissions = [
+ "Get",
+ "List",
]
+ id = (known after apply)
+ key_permissions = [
+ "Get",
+ "List",
]
+ key_vault_id = (known after apply)
+ object_id = "60ab1441-a8a9-4990-aa30-c94e9f0b047b"
+ secret_permissions = [
+ "Get",
+ "List",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_key_vault_access_policy.product_team_access_policy will be created
+ resource "azurerm_key_vault_access_policy" "product_team_access_policy" {
+ certificate_permissions = [
+ "List",
+ "Update",
+ "Create",
+ "Import",
+ "Delete",
+ "ManageContacts",
+ "ManageIssuers",
+ "GetIssuers",
+ "ListIssuers",
+ "SetIssuers",
+ "DeleteIssuers",
+ "Recover",
]
+ id = (known after apply)
+ key_permissions = [
+ "List",
+ "Update",
+ "Create",
+ "Import",
+ "Delete",
+ "Recover",
]
+ key_vault_id = (known after apply)
+ object_id = "e7ea2042-4ced-45dd-8ae3-e051c6551789"
+ secret_permissions = [
+ "List",
+ "Set",
+ "Delete",
+ "Recover",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_monitor_diagnostic_setting.kv-ds will be created
+ resource "azurerm_monitor_diagnostic_setting" "kv-ds" {
+ id = (known after apply)
+ log_analytics_destination_type = (known after apply)
+ log_analytics_workspace_id = "/subscriptions/bf308a5c-0624-4334-8ff8-8dca9fd43783/resourceGroups/oms-automation/providers/Microsoft.OperationalInsights/workspaces/hmcts-sandbox"
+ name = "applesi-sbox"
+ target_resource_id = (known after apply)
+ enabled_log {
+ category = "AuditEvent"
# (1 unchanged attribute hidden)
}
+ log (known after apply)
}
# module.vault.azurerm_user_assigned_identity.managed_identity[0] will be created
+ resource "azurerm_user_assigned_identity" "managed_identity" {
+ client_id = (known after apply)
+ id = (known after apply)
+ location = "uksouth"
+ name = "apple-sbox-mi"
+ principal_id = (known after apply)
+ resource_group_name = "managed-identities-sbox-rg"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ tenant_id = (known after apply)
}
Plan: 18 to add, 0 to change, 0 to destroy. ℹ️ Objects have changed outside of TerraformThis feature was introduced from Terraform v0.15.4. Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# azurerm_resource_group.shared_resource_group has been deleted
- resource "azurerm_resource_group" "shared_resource_group" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox"
- name = "apple-shared-infrastructure-sbox" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
# (2 unchanged attributes hidden)
}
# module.application_insights.azurerm_application_insights.this has been deleted
- resource "azurerm_application_insights" "this" {
- app_id = "85714c4a-5ff3-47d0-9b3e-3bac0ca8a5a5" -> null
- connection_string = (sensitive value) -> null
- id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.Insights/components/apple-sbox" -> null
- instrumentation_key = (sensitive value) -> null
- name = "apple-sbox" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
# (13 unchanged attributes hidden)
}
# module.servicebus-namespace.azurerm_servicebus_namespace.servicebus_namespace has been deleted
- resource "azurerm_servicebus_namespace" "servicebus_namespace" {
- id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.ServiceBus/namespaces/apple-servicebus-sbox" -> null
- name = "apple-servicebus-sbox" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
# (14 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# module.servicebus-namespace.azurerm_servicebus_namespace_authorization_rule.send_listen_auth_rule has been deleted
- resource "azurerm_servicebus_namespace_authorization_rule" "send_listen_auth_rule" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.ServiceBus/namespaces/apple-servicebus-sbox/authorizationRules/SendAndListenSharedAccessKey"
name = "SendAndListenSharedAccessKey"
- primary_connection_string = (sensitive value) -> null
- primary_key = (sensitive value) -> null
- secondary_connection_string = (sensitive value) -> null
- secondary_key = (sensitive value) -> null
# (6 unchanged attributes hidden)
}
# module.vault.azurerm_key_vault.kv has been deleted
- resource "azurerm_key_vault" "kv" {
- id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox" -> null
- name = "applesi-sbox" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
- vault_uri = "https://applesi-sbox.vault.azure.net/" -> null
# (12 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# module.vault.azurerm_user_assigned_identity.managed_identity[0] has been deleted
- resource "azurerm_user_assigned_identity" "managed_identity" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/managed-identities-sbox-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/apple-sbox-mi"
name = "apple-sbox-mi"
- principal_id = "0bda41cb-d7e5-4f9f-98a5-d0cf156d6328" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
# (4 unchanged attributes hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the |
3892a8d
to
319bcaa
Compare
319bcaa
to
d33807b
Compare
d33807b
to
28b3687
Compare
28b3687
to
79fe473
Compare
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
Autoclosing SkippedThis PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error. |
4d9e9dc
Pull request was closed
This PR contains the following updates:
1.8.3
->1.9.1
Release Notes
hashicorp/terraform (hashicorp/terraform)
v1.9.1
Compare Source
1.9.1 (Unreleased)
UPGRADE NOTES:
terraform init
orterraform get
in case of larger git repositories. Please do file an issue if you find the performance difference noticable. (#35376)BUG FIXES:
terraform test
: Removed additional erroneous error message when referencing attributes that don't exist. (#35408)import
blocks: Fix crash that occurs when incorrectly referencing theto
resource from theid
attribute. (#35420)v1.9.0
Compare Source
v1.8.5
Compare Source
1.8.5 (June 5, 2024)
BUG FIXES:
terraform test
: Remove duplicate warning diagnostic when providing values for unknown variables in run blocks. (#35172)v1.8.4
Compare Source
1.8.4 (May 22, 2024)
BUG FIXES:
core
: Fix exponential slowdown in some cases when modules are usingdepends_on
. (#35157)import
blocks: Fix bug where resources with nested, computed, and optionalid
attributes would fail to generate configuration. (#35220)golang.org/x/net
release, which addressed CVE-2023-45288 (#35165)Configuration
📅 Schedule: Branch creation - "after 7am and before 11am every weekday" in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.