-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade node to 18 #2063
Upgrade node to 18 #2063
Conversation
Terraform plan for dev No changes. Your infrastructure matches the configuration.
❌ Plan not applied in Deploy to Development and Management Environment #230 (Plan has changed) |
Terraform plan for meta Plan: 1 to add, 0 to change, 1 to destroy.Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
-/+ destroy and then create replacement
Terraform will perform the following actions:
# null_resource.share-backup-to-spaces is tainted, so must be replaced
-/+ resource "null_resource" "share-backup-to-spaces" {
~ id = "*******************" -> (known after apply)
}
Plan: 1 to add, 0 to change, 1 to destroy.
Warning: Argument is deprecated
with module.s3-backups.cloudfoundry_service_instance.bucket,
on /tmp/terraform-data-dir/modules/s3-backups/s3/main.tf line 14, in resource "cloudfoundry_service_instance" "bucket":
14: recursive_delete = var.recursive_delete
Since CF API v3, recursive delete is always done on the cloudcontroller side.
This will be removed in future releases ✅ Plan applied in Deploy to Development and Management Environment #230 |
c200314
to
5e29300
Compare
Minimum allowed coverage is Generated by 🐒 cobertura-action against 68a3f7e |
5e29300
to
556ec23
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. Builds/runs locally, all tests pass. Recommend we merge and test live.
It looks like some of the actions shifted while this was awaiting review. I'll leave the fix on those files to @asteel-gsa or @danswick , but the overall PR tests well locally. |
This needs be rebased onto main and any merge conflicts accounted for @danswick |
fixes #1301
Right now we're using three major versions of Node:
.nvmrc
(though I'm not sure this gets referenced) and some workflows: https://github.com/GSA-TTS/FAC/blob/main/backend/.nvmrcFAC/.github/workflows/testing-from-build.yml
Line 25 in be0cb21
v14 is already past EOL and v16 reaches EOL in 3 days. This PR bumps everything to v18 to help ensure everything is consistent. This change should also resolve some persistent EOL warning messages.
PR checklist: submitters
main
into your branch shortly before creating the PR. (You should also be mergingmain
into your branch regularly during development.)PR checklist: reviewers
make docker-clean; make docker-first-run && docker compose up
; then rundocker compose exec web /bin/bash -c "python manage.py test"
The larger the PR, the stricter we should be about these points.