Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency hashicorp/terraform to v1.8.5 #2077

Closed
wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jun 12, 2023

Mend Renovate

This PR contains the following updates:

Package Update Change
hashicorp/terraform minor 1.7.3 -> 1.8.5

Release Notes

hashicorp/terraform (hashicorp/terraform)

v1.8.5

Compare Source

1.8.5 (June 5, 2024)

BUG FIXES:

  • terraform test: Remove duplicate warning diagnostic when providing values for unknown variables in run blocks. (#​35172)

v1.8.4

Compare Source

1.8.4 (May 22, 2024)

BUG FIXES:

  • core: Fix exponential slowdown in some cases when modules are using depends_on. (#​35157)
  • import blocks: Fix bug where resources with nested, computed, and optional id attributes would fail to generate configuration. (#​35220)
  • Updated to new golang.org/x/net release, which addressed CVE-2023-45288 (#​35165)

v1.8.3

Compare Source

1.8.3 (May 8, 2024)

BUG FIXES:

  • terraform test: Providers configured within an overridden module could panic. (#​35110)
  • core: Fix crash when a provider incorrectly plans a nested object when the configuration is null (#​35090)

v1.8.2

Compare Source

1.8.2 (April 24, 2024)

BUG FIXES:

  • terraform apply: Prevent panic when a provider erroneously provides unknown values. (#​35048)
  • terraform plan: Replace panic with error message when self-referencing resources and data sources from the count and for_each meta attributes. (#​35047)
  • terraform test: Restore TF_ENV_* variables being made available to testing modules. (#​35014)
  • terraform test: Prevent crash when referencing local variables within overridden modules. (#​35030)

ENHANCEMENTS:

  • Improved performance by removing unneeded additional computation for a disabled experimental feature. (#​35066)

OTHER CHANGES:

  • Update all references to Terraform Cloud to refer to HCP Terraform, the service's new name. This only affects display text; the cloud block and environment variables like TF_CLOUD_ORGANIZATION remain unchanged. (#​35050)

NOTE:

Starting with this release, we are including a copy of our license file in all packaged versions of our releases, such as the release .zip files. If you are consuming these files directly and would prefer to extract the one terraform file instead of extracting everything, you need to add an extra argument specifying the file to extract, like this:

unzip terraform_1.8.2_linux_amd64.zip terraform

v1.8.1

Compare Source

1.8.1 (April 17, 2024)

BUG FIXES:

  • Fix crash in terraform plan when referencing a module output that does not exist within the try(...) function. (#​34985)
  • Fix crash in terraform apply when referencing a module with no planned changes. (#​34985)
  • moved block: Fix crash when move targets a module which no longer exists. (#​34986)
  • import block: Fix crash when generating configuration for resources with complex sensitive attributes. (#​34996)
  • Plan renderer: Correctly render strings that begin with JSON compatible text but don't end with it. (#​34959)

v1.8.0

Compare Source

1.8.0 (April 10, 2024)

If you are upgrading from Terraform v1.7 or earlier, please refer to
the Terraform v1.8 Upgrade Guide.

NEW FEATURES:

  • Providers can now offer functions which can be used from within the Terraform configuration language.

    The syntax for calling a provider-contributed function is provider::provider_name::function_name(). (#​34394)

  • Providers can now transfer the ownership of a remote object between resources of different types, for situations where there are two different resource types that represent the same remote object type.

    This extends the moved block behavior to support moving between two resources of different types only if the provider for the target resource type declares that it can convert from the source resource type. Refer to provider documentation for details on which pairs of resource types are supported.

  • New issensitive function returns true if the given value is marked as sensitive.

ENHANCEMENTS:

  • terraform test: File-level variables can now refer to global variables. (#​34699)

  • When generating configuration based on import blocks, Terraform will detect strings that contain valid JSON syntax and generate them as calls to the jsonencode function, rather than generating a single string. This is primarily motivated by readability, but might also be useful if you need to replace part of the literal value with an expression as you generalize your module beyond the one example used for importing.

  • terraform plan now uses a different presentation for describing changes to lists where the old and new lists have the same length. It now compares the elements with correlated indices and shows a separate diff for each one, rather than trying to show a diff for the list as a whole. The behavior is unchanged for lists of different lengths.

  • terraform providers lock accepts a new boolean option -enable-plugin-cache. If specified, and if a global plugin cache is configured, Terraform will use the cache in the provider lock process. (#​34632)

  • built-in "terraform" provider: new decode_tfvars, encode_tfvars, and encode_expr functions, for unusual situations where it's helpful to manually generate or read from Terraform's "tfvars" format. (#​34718)

  • terraform show's JSON rendering of a plan now includes two explicit flags "applyable" and "complete", which both summarize characteristics of a plan that were previously only inferrable by consumers replicating some of Terraform Core's own logic. (#​34642)

    "applyable" means that it makes sense for a wrapping automation to offer to apply this plan.

    "complete" means that applying this plan is expected to achieve convergence between desired and actual state. If this flag is present and set to false then wrapping automations should ideally encourage an operator to run another plan/apply round to continue making progress toward convergence.

BUG FIXES:

  • core: Sensitive values will now be tracked more accurately in state and plans, preventing unexpected updates with no apparent changes. (#​34567)
  • core: Fix incorrect error message when using in invalid iterator argument within a dynamic block. (#​34751)
  • core: Fixed edge-case bug that could cause loss of floating point precision when round-tripping due to incorrectly using a MessagePack integer to represent a large non-integral number. (#​24576)
  • config: Converting from an unknown map value to an object type now correctly handles the situation where the map element type disagrees with an optional attribute of the target type, since when a map value is unknown we don't yet know which keys it has and thus cannot predict what subset of the elements will get converted as attributes in the resulting object. (#​34756)
  • cloud: Fixed unparsed color codes in policy failure error messages. (#​34473)

Previous Releases

For information on prior major and minor releases, see their changelogs:

v1.7.5

Compare Source

1.7.5 (March 13, 2024)

BUG FIXES:

  • backend/s3: When using s3 backend and encountering a network issue, the retry code would fail with "failed to rewind transport stream for retry". Now the retry should be successful. (#​34796)

v1.7.4

Compare Source

1.7.4 (February 21, 2024)

BUG FIXES:

  • terraform test: Fix automatic loading of variable files within the test directory on windows platforms. (#​34666)
  • plan renderer: Very large numbers (> 2^63) will no longer be truncated in the human-readable plan. (#​34702)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@hmcts-jenkins-a-to-c
Copy link
Contributor

hmcts-jenkins-a-to-c bot commented Jun 12, 2023

Plan Result

Plan: 0 to add, 10 to change, 0 to destroy.
  • Update
    • azurerm_key_vault_secret.flexible_secret["DATABASE"]
    • azurerm_key_vault_secret.flexible_secret["HOST"]
    • azurerm_key_vault_secret.flexible_secret["PASS"]
    • azurerm_key_vault_secret.flexible_secret["PORT"]
    • azurerm_key_vault_secret.flexible_secret["USER"]
    • azurerm_key_vault_secret.flexible_secret_staging["host"]
    • azurerm_key_vault_secret.flexible_secret_staging["name"]
    • azurerm_key_vault_secret.flexible_secret_staging["password"]
    • azurerm_key_vault_secret.flexible_secret_staging["port"]
    • azurerm_key_vault_secret.flexible_secret_staging["user"]
Change Result (Click me)
  # azurerm_key_vault_secret.flexible_secret["DATABASE"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-DATABASE/1e877432a45644dc957e4315c2fabc59"
        name                    = "blob-router-POSTGRES-FLEXIBLE-DATABASE"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret["HOST"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-HOST/6aa828f356264ec7b7edac57e53f7819"
        name                    = "blob-router-POSTGRES-FLEXIBLE-HOST"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret["PASS"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-PASS/7f3ae7fe77f54babb83858b88c3f123c"
        name                    = "blob-router-POSTGRES-FLEXIBLE-PASS"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret["PORT"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-PORT/258b796368ff4a5bae718e543eae24fa"
        name                    = "blob-router-POSTGRES-FLEXIBLE-PORT"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret["USER"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-USER/9a55d421809b4beca1bdcd742c21f873"
        name                    = "blob-router-POSTGRES-FLEXIBLE-USER"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["host"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-host/51af603b98ee42aca7cf2631adc3bbe0"
        name                    = "blob-router-staging-flexible-db-host"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["name"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-name/1b3b5c5e0c554eb89a60aef83a27c8cb"
        name                    = "blob-router-staging-flexible-db-name"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["password"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-password/f4dab7117dd94d0c917122dc8264f07f"
        name                    = "blob-router-staging-flexible-db-password"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["port"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-port/3f6911f2652641e28c00c0f7617e8352"
        name                    = "blob-router-staging-flexible-db-port"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["user"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-user/dceb88eefa2e4175b5479e9433a0a42c"
        name                    = "blob-router-staging-flexible-db-user"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

Plan: 0 to add, 10 to change, 0 to destroy.

@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 12, 2023 16:25 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from bdc18d4 to e3defcf Compare June 12, 2023 16:31
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 12, 2023 16:37 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from e3defcf to 9847649 Compare June 13, 2023 08:41
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 13, 2023 08:55 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 9847649 to df94844 Compare June 16, 2023 09:01
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 16, 2023 09:09 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from df94844 to cb41d39 Compare June 16, 2023 11:11
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 16, 2023 11:18 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from b78d19c to 2ed0038 Compare June 16, 2023 12:29
@alivenichoppa alivenichoppa enabled auto-merge (squash) June 16, 2023 12:29
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 16, 2023 12:35 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 2ed0038 to 6360582 Compare June 16, 2023 15:32
@renovate renovate bot changed the title Update dependency hashicorp/terraform to v1.5.0 Update dependency hashicorp/terraform to v1.5.1 Jun 21, 2023
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 6360582 to 566f906 Compare June 21, 2023 11:47
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 21, 2023 11:55 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 566f906 to ab26870 Compare June 23, 2023 16:14
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 23, 2023 16:22 Abandoned
@renovate renovate bot changed the title Update dependency hashicorp/terraform to v1.5.1 Update dependency hashicorp/terraform to v1.5.2 Jun 28, 2023
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch 2 times, most recently from 21d7535 to 84e79e2 Compare June 29, 2023 14:20
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview June 29, 2023 14:27 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 84e79e2 to 162e955 Compare June 30, 2023 11:16
@renovate renovate bot changed the title Update dependency hashicorp/terraform to v1.8.0 Update dependency hashicorp/terraform to v1.8.1 Apr 17, 2024
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from b2b2d97 to d563132 Compare April 17, 2024 10:45
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 17, 2024 10:54 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from d563132 to 3f4bb8d Compare April 17, 2024 12:57
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 17, 2024 13:05 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 3f4bb8d to 7d006f7 Compare April 23, 2024 07:57
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 23, 2024 08:09 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 7d006f7 to b0feffa Compare April 23, 2024 10:23
@renovate renovate bot changed the title Update dependency hashicorp/terraform to v1.8.1 Update dependency hashicorp/terraform to v1.8.2 Apr 24, 2024
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from b0feffa to 84e192a Compare April 24, 2024 11:13
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 84e192a to 407bea8 Compare April 26, 2024 10:10
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 26, 2024 10:20 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 407bea8 to f9e8f74 Compare May 8, 2024 10:28
@renovate renovate bot changed the title Update dependency hashicorp/terraform to v1.8.2 Update dependency hashicorp/terraform to v1.8.3 May 8, 2024
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from f9e8f74 to 105b49a Compare May 17, 2024 08:46
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview May 17, 2024 08:56 Abandoned
@renovate renovate bot changed the title Update dependency hashicorp/terraform to v1.8.3 Update dependency hashicorp/terraform to v1.8.4 May 22, 2024
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 105b49a to 51444b3 Compare May 22, 2024 19:26
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 51444b3 to bcedf7d Compare May 24, 2024 09:03
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview May 24, 2024 09:11 Abandoned
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from bcedf7d to 1d76041 Compare June 5, 2024 10:01
@renovate renovate bot changed the title Update dependency hashicorp/terraform to v1.8.4 Update dependency hashicorp/terraform to v1.8.5 Jun 5, 2024
@renovate renovate bot force-pushed the renovate/hashicorp-terraform-1.x branch from 1d76041 to 5a68743 Compare June 5, 2024 13:03
auto-merge was automatically disabled June 5, 2024 14:42

Pull request was closed

Copy link
Contributor Author

renovate bot commented Jun 5, 2024

Renovate Ignore Notification

Because you closed this PR without merging, Renovate will ignore this update (1.8.5). You will get a PR once a newer version is released. To ignore this dependency forever, add it to the ignoreDeps array of your Renovate config.

If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR.

@renovate renovate bot deleted the renovate/hashicorp-terraform-1.x branch June 5, 2024 14:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant