Skip to content

Comments

chore(deps): update authelia/authelia docker tag to v4.39.15#258

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/authelia-authelia-4.x
Open

chore(deps): update authelia/authelia docker tag to v4.39.15#258
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/authelia-authelia-4.x

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Mar 26, 2025

This PR contains the following updates:

Package Update Change
authelia/authelia (source) minor 4.38.104.39.15

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

authelia/authelia (authelia/authelia)

v4.39.15

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.15
  • docker pull ghcr.io/authelia/authelia:4.39.15

v4.39.14

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.14
  • docker pull ghcr.io/authelia/authelia:4.39.14

v4.39.13

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.13
  • docker pull ghcr.io/authelia/authelia:4.39.13

v4.39.12

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.12
  • docker pull ghcr.io/authelia/authelia:4.39.12

v4.39.11

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.11
  • docker pull ghcr.io/authelia/authelia:4.39.11

v4.39.10

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.10
  • docker pull ghcr.io/authelia/authelia:4.39.10

v4.39.9

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.9
  • docker pull ghcr.io/authelia/authelia:4.39.9

v4.39.8

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.8
  • docker pull ghcr.io/authelia/authelia:4.39.8

v4.39.7

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.7
  • docker pull ghcr.io/authelia/authelia:4.39.7

v4.39.6

Compare Source

Notable Changes

OpenID Connect 1.0 client registrations incorrectly allowed none as a authorization_signed_response_alg value, this is no longer the case and if you specified this value you'll have to either remove it or update it to the new correct default of RS256.

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.6
  • docker pull ghcr.io/authelia/authelia:4.39.6

v4.39.5

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.5
  • docker pull ghcr.io/authelia/authelia:4.39.5

v4.39.4

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.4
  • docker pull ghcr.io/authelia/authelia:4.39.4

v4.39.3

Compare Source

Important Note: The v4.39.2 release inadvertently removed the legacy OpenID Connect 1.0 endpoints which have not been documented at least in the last 3 years either at the discovery document or on the website. While these changes were technically unintentional right at this moment they were going to be hard removed at some point before we graduated OpenID Connect 1.0 out of a experimental/beta state and users had previously been notified of this change, as such we're going to leave them as is. Users should refer to our documentation as well as their instances discovery endpoints to obtain the correct URLs. The URLs that potentially may need updating are as follows: the URL /api/oidc/jwks previously handled requests for the JSON Web Key Set Endpoint, the URL /api/oidc/authorize previously also handled requests for the Authorization Endpoint, the URL /api/oidc/introspect previously also handled requests for the Introspection Endpoint, and the URL /api/oidc/revoke previously also handled requests for the Revocation Endpoint.

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.3
  • docker pull ghcr.io/authelia/authelia:4.39.3

v4.39.2

Compare Source

Important Note: The v4.39.2 release inadvertently removed the legacy OpenID Connect 1.0 endpoints which have not been documented in the last 3 years either at the discovery document or on the website. While these changes were technically unintentional right at this moment they were going to be hard removed at some point before we graduated OpenID Connect 1.0 out of a experimental/beta state, as such we're going to leave them as is. Users should refer to our documentation as well as their instances discovery endpoints to obtain the correct URLs.

Bug Fixes
Performance Improvements
Docker Container
  • docker pull authelia/authelia:4.39.2
  • docker pull ghcr.io/authelia/authelia:4.39.2

v4.39.1

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.39.1
  • docker pull ghcr.io/authelia/authelia:4.39.1

v4.39.0

Compare Source

Summary

Please see the Authelia Blog: 4.39 Release Notes for human readable summaries of the changes. It's important to note some critical changes have occurred in this release that warrant some user attention.

Specific critical changes which are detailed in the Authelia Blog: 4.39 Release Notes to watch out for:

  1. Changes that will require manual intervention in some scenarios:
    • The default claims for ID Tokens minted by the Authelia OpenID Connect 1.0 Identity Provider have changed.
  2. Changes that shouldn't require manual intervention but are significant enough to cause issues in some edge cases:
    • The official Authelia container has been heavily changed.
    • The official Systemd Units which are packaged in AUR packages, DEB packages, and the GitHub artifacts archives have been heavily changed.

Detailed Changes

Bug Fixes
Features
Docker Container
  • docker pull authelia/authelia:4.39.0
  • docker pull ghcr.io/authelia/authelia:4.39.0

v4.38.19

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.19
  • docker pull ghcr.io/authelia/authelia:4.38.19

v4.38.18

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.18
  • docker pull ghcr.io/authelia/authelia:4.38.18

v4.38.17

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.17
  • docker pull ghcr.io/authelia/authelia:4.38.17

v4.38.16

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.16
  • docker pull ghcr.io/authelia/authelia:4.38.16

v4.38.15

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.15
  • docker pull ghcr.io/authelia/authelia:4.38.15

v4.38.14

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.14
  • docker pull ghcr.io/authelia/authelia:4.38.14

v4.38.13

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.13
  • docker pull ghcr.io/authelia/authelia:4.38.13

v4.38.12

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.12
  • docker pull ghcr.io/authelia/authelia:4.38.12

v4.38.11

Compare Source

Bug Fixes
Docker Container
  • docker pull authelia/authelia:4.38.11
  • docker pull ghcr.io/authelia/authelia:4.38.11

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot enabled auto-merge (rebase) March 26, 2025 19:30
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-H1hkMyb7P7D6mkBy

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

auto-merge was automatically disabled March 26, 2025 19:30

Base branch requires signed commits

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from 4975753 to 7af82cf Compare May 10, 2025 15:05
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.1 chore(deps): update authelia/authelia docker tag to v4.39.2 May 10, 2025
@renovate renovate bot temporarily deployed to production May 10, 2025 15:05 Inactive
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-KFiDncjrwNgF71mh

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from 7af82cf to e5bb2b8 Compare May 11, 2025 14:15
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.2 chore(deps): update authelia/authelia docker tag to v4.39.3 May 11, 2025
@renovate renovate bot temporarily deployed to production May 11, 2025 14:15 Inactive
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-yAGjgsQ3e2N8CoJu

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from e5bb2b8 to e2965cd Compare May 25, 2025 05:53
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.3 chore(deps): update authelia/authelia docker tag to v4.39.4 May 25, 2025
@renovate renovate bot temporarily deployed to production May 25, 2025 05:53 Inactive
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-zBYXboNezfvySQMC

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
hcloud_server.web: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from e2965cd to 07f7289 Compare July 13, 2025 10:38
@renovate renovate bot enabled auto-merge (rebase) July 13, 2025 10:38
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.4 chore(deps): update authelia/authelia docker tag to v4.39.5 Jul 13, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-bCLMkKgJgAk9aJ3L

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

auto-merge was automatically disabled July 13, 2025 10:38

Base branch requires signed commits

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from 07f7289 to cd9b514 Compare August 9, 2025 12:38
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.5 chore(deps): update authelia/authelia docker tag to v4.39.6 Aug 9, 2025
@github-actions
Copy link

github-actions bot commented Aug 9, 2025

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-RgtayauE8m3w31gq

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.aaaa: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.a: Drift detected (update)
hcloud_server.web: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from cd9b514 to c1ab7d7 Compare August 31, 2025 09:51
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.6 chore(deps): update authelia/authelia docker tag to v4.39.7 Aug 31, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-Z3KYVDTALfue8FEY

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_server.web: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.a: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.8 chore(deps): update authelia/authelia docker tag to v4.39.9 Sep 9, 2025
@github-actions
Copy link

github-actions bot commented Sep 9, 2025

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-pUwy6UqzXbQ2K2A6

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_server.web: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from 83bd3f7 to a28225d Compare September 16, 2025 05:55
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.9 chore(deps): update authelia/authelia docker tag to v4.39.10 Sep 16, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-TpDxAMcQwD5p6XF5

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_server.web: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot enabled auto-merge (rebase) September 19, 2025 14:27
auto-merge was automatically disabled September 19, 2025 14:27

Base branch requires signed commits

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from a28225d to 023f472 Compare October 1, 2025 20:58
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.10 chore(deps): update authelia/authelia docker tag to v4.39.11 Oct 1, 2025
@github-actions
Copy link

github-actions bot commented Oct 1, 2025

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-YjYJMNZy57KQTZUn

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from 023f472 to f0d1f87 Compare October 8, 2025 11:11
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.11 chore(deps): update authelia/authelia docker tag to v4.39.12 Oct 8, 2025
@github-actions
Copy link

github-actions bot commented Oct 8, 2025

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-kTpVKq9oKNPjVwug

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from f0d1f87 to 6bc6e4d Compare October 12, 2025 09:30
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.12 chore(deps): update authelia/authelia docker tag to v4.39.13 Oct 12, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-NBGWwrdEHEUxJLR4

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aaaa: Drift detected (delete)
cloudflare_record.a: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
hcloud_server.web: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from 6bc6e4d to 141460a Compare November 9, 2025 14:39
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.13 chore(deps): update authelia/authelia docker tag to v4.39.14 Nov 9, 2025
@github-actions
Copy link

github-actions bot commented Nov 9, 2025

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-SjayQEWo5knYq2TN

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.a: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/authelia-authelia-4.x branch from 141460a to 2d76cdd Compare November 29, 2025 18:54
@renovate renovate bot changed the title chore(deps): update authelia/authelia docker tag to v4.39.14 chore(deps): update authelia/authelia docker tag to v4.39.15 Nov 29, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-P7Vj5fSnZYCc3mxe

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_server.web: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)
cloudflare_record.a: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants