Skip to content

Commit 296df48

Browse files
committed
chore: format
1 parent 147ec28 commit 296df48

File tree

2 files changed

+19
-15
lines changed

2 files changed

+19
-15
lines changed

docs/monitoring.md

Lines changed: 18 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,23 +39,27 @@ To generate the auth token, click
3939
[this](https://sentry.io/orgredirect/settings/:orgslug/developer-settings/new-internal/)
4040
to create an internal integration (which grants the selected capabilities to the
4141
recipient, similar to how RBAC works). Give it a name and add the scope for
42-
`Releases:Admin` and `Organization:Read`. Press Save, and then generate the auth token at the
43-
bottom of the page under "Tokens", and copy that to a secure location (this
44-
becomes `SENTRY_AUTH_TOKEN`). Then visit the organization general settings page and copy
45-
the organization slug (`SENTRY_ORG`), and the slug name for your project under `Organization > Projects > Project > Name`
42+
`Releases:Admin` and `Organization:Read`. Press Save, and then generate the auth
43+
token at the bottom of the page under "Tokens", and copy that to a secure
44+
location (this becomes `SENTRY_AUTH_TOKEN`). Then visit the organization general
45+
settings page and copy the organization slug (`SENTRY_ORG`), and the slug name
46+
for your project under `Organization > Projects > Project > Name`
4647
(`SENTRY_PROJECT`).
4748

4849
In the 'build' section of the [Dockerfile](../other/Dockerfile), there is an
49-
example of how to pass `SENTRY_AUTH_TOKEN` secret, so it
50-
is available to Vite when `npm run build` is run. You may also uncomment and hard code your `SENTRY_ORG` and `SENTRY_PROJECT` values. Setup up your secrets in [GitHub Actions secrets](https://docs.github.com/en/actions/security-guides/using-secrets-in-github-actions). You can do the same for any other secret (environment
51-
variable) you need at build time, just make sure those secrets (variables) are
52-
available on the CI runner: see the 'deploy' job from
53-
[`deploy`](../.github/workflows/deploy.yml) workflow. Note that these do not
54-
need to be added to the [`env.server`](../app/utils/env.server.ts) env vars
55-
schema, as they are only used during the build and not the runtime.
50+
example of how to pass `SENTRY_AUTH_TOKEN` secret, so it is available to Vite
51+
when `npm run build` is run. You may also uncomment and hard code your
52+
`SENTRY_ORG` and `SENTRY_PROJECT` values. Setup up your secrets in
53+
[GitHub Actions secrets](https://docs.github.com/en/actions/security-guides/using-secrets-in-github-actions).
54+
You can do the same for any other secret (environment variable) you need at
55+
build time, just make sure those secrets (variables) are available on the CI
56+
runner: see the 'deploy' job from [`deploy`](../.github/workflows/deploy.yml)
57+
workflow. Note that these do not need to be added to the
58+
[`env.server`](../app/utils/env.server.ts) env vars schema, as they are only
59+
used during the build and not the runtime.
5660

5761
The Sentry Vite plugin in [`vite.config.ts`](../vite.config.ts) will create
5862
sentry releases for you and automatically associate commits during the vite
59-
build once the `SENTRY_AUTH_TOKEN` is set.
60-
In this setup we have utilized a simple strategy for naming releases of using
61-
the commit sha, passed in as a build arg via the GitHub action workflow.
63+
build once the `SENTRY_AUTH_TOKEN` is set. In this setup we have utilized a
64+
simple strategy for naming releases of using the commit sha, passed in as a
65+
build arg via the GitHub action workflow.

tests/playwright-utils.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ export const test = base.extend<{
117117
ghUser = newGitHubUser
118118
return newGitHubUser
119119
})
120-
120+
121121
const user = await prisma.user.findUniqueOrThrow({
122122
select: { id: true, name: true },
123123
where: { email: normalizeEmail(ghUser!.primaryEmail) },

0 commit comments

Comments
 (0)