Skip to content

chore: upgrade traefik#11265

Merged
loks0n merged 1 commit into1.8.xfrom
chore/upgrade-traefik
Feb 6, 2026
Merged

chore: upgrade traefik#11265
loks0n merged 1 commit into1.8.xfrom
chore/upgrade-traefik

Conversation

@loks0n
Copy link
Member

@loks0n loks0n commented Feb 6, 2026

No description provided.

@loks0n loks0n changed the base branch from main to 1.8.x February 6, 2026 19:17
@coderabbitai
Copy link
Contributor

coderabbitai bot commented Feb 6, 2026

Caution

Review failed

Failed to post review comments

📝 Walkthrough

Walkthrough

This PR introduces version 1.8.1 with a comprehensive framework migration from Utopia\App to Utopia\Http routing across the codebase, alongside significant architectural and schema updates. Changes include: removal of four API controllers (avatars, console, health, storage), database schema extensions (new labels field in teams, new attributes in projects and sites), refactored API key handling to support multiple key types (standard, organization, account), split scope configuration into project/organization/account-specific files, and enhanced audit system integration with new adapter patterns. Environment variables and constants are expanded to support new features. The migration affects 30+ files with consistent routing facade substitution but includes heterogeneous logic changes in request handling, domain validation, and event processing.

Estimated code review effort

🎯 4 (Complex) | ⏱️ ~60 minutes

Possibly related PRs

🚥 Pre-merge checks | ❌ 3
❌ Failed checks (3 warnings)
Check name Status Explanation Resolution
Title check ⚠️ Warning The PR title 'chore: upgrade traefik' is completely unrelated to the changeset, which contains extensive changes across configuration files, controllers, dependencies, and database schemas for version 1.8.1 release - not a traefik upgrade. Update the PR title to accurately reflect the main changes, such as 'chore: release version 1.8.1 with new features and infrastructure updates' or provide a title matching the actual changeset content.
Description check ⚠️ Warning No pull request description was provided by the author, making it impossible to assess whether it relates to the changeset. Add a detailed pull request description explaining the purpose of these extensive changes, including major features, infrastructure updates, and deprecations introduced in this release.
Docstring Coverage ⚠️ Warning Docstring coverage is 60.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing touches
  • 📝 Generate docstrings
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch chore/upgrade-traefik

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@pkg-pr-new
Copy link

pkg-pr-new bot commented Feb 6, 2026

Open in StackBlitz

npm i https://pkg.pr.new/appwrite/appwrite/@appwrite.io/console@11265

commit: d864a61

@github-actions
Copy link

github-actions bot commented Feb 6, 2026

Security Scan Results for PR

Docker Image Scan Results

Package Version Vulnerability Severity
libcrypto3 3.5.4-r0 CVE-2025-15467 CRITICAL
libcrypto3 3.5.4-r0 CVE-2025-69419 HIGH
libcrypto3 3.5.4-r0 CVE-2025-69421 HIGH
libexpat 2.7.3-r0 CVE-2026-24515 CRITICAL
libpng 1.6.51-r0 CVE-2025-66293 HIGH
libpng 1.6.51-r0 CVE-2026-22695 HIGH
libpng 1.6.51-r0 CVE-2026-22801 HIGH
libpng-dev 1.6.51-r0 CVE-2025-66293 HIGH
libpng-dev 1.6.51-r0 CVE-2026-22695 HIGH
libpng-dev 1.6.51-r0 CVE-2026-22801 HIGH
libssl3 3.5.4-r0 CVE-2025-15467 CRITICAL
libssl3 3.5.4-r0 CVE-2025-69419 HIGH
libssl3 3.5.4-r0 CVE-2025-69421 HIGH
libxml2 2.13.8-r0 CVE-2025-49794 CRITICAL
libxml2 2.13.8-r0 CVE-2025-49796 CRITICAL
libxml2 2.13.8-r0 CVE-2025-49795 HIGH
libxml2 2.13.8-r0 CVE-2025-6021 HIGH
openssl 3.5.4-r0 CVE-2025-15467 CRITICAL
openssl 3.5.4-r0 CVE-2025-69419 HIGH
openssl 3.5.4-r0 CVE-2025-69421 HIGH
openssl-dev 3.5.4-r0 CVE-2025-15467 CRITICAL
openssl-dev 3.5.4-r0 CVE-2025-69419 HIGH
openssl-dev 3.5.4-r0 CVE-2025-69421 HIGH
py3-urllib3 1.26.20-r0 CVE-2026-21441 HIGH
py3-urllib3-pyc 1.26.20-r0 CVE-2026-21441 HIGH
github.com/containerd/containerd/v2 v2.0.2 CVE-2024-25621 HIGH
golang.org/x/crypto v0.31.0 CVE-2025-22869 HIGH
golang.org/x/oauth2 v0.24.0 CVE-2025-22868 HIGH
stdlib 1.22.10 CVE-2025-47907 HIGH
stdlib 1.22.10 CVE-2025-58183 HIGH
stdlib 1.22.10 CVE-2025-61726 HIGH
stdlib 1.22.10 CVE-2025-61728 HIGH
stdlib 1.22.10 CVE-2025-61729 HIGH

Source Code Scan Results

🎉 No vulnerabilities found!

@github-actions
Copy link

github-actions bot commented Feb 6, 2026

✨ Benchmark results

  • Requests per second: 2,283
  • Requests with 200 status code: 410,952
  • P99 latency: 0.067983573

⚡ Benchmark Comparison

Metric This PR Latest version
RPS 2,283 1,210
200 410,952 217,779
P99 0.067983573 0.170944024

@loks0n loks0n merged commit 9c03c5f into 1.8.x Feb 6, 2026
236 of 241 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant