chore(deps): update terraform hashicorp/terraform to v1 - abandoned #292
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
~> 0.13->~> 1.0Release Notes
hashicorp/terraform
v1.4.2Compare Source
1.4.2 (March 16, 2023)
BUG FIXES:
setproductcaused Terraform to crash (#32860)v1.4.1Compare Source
1.4.1 (March 15, 2023)
BUG FIXES:
depends_onattribute set, while still preventing thedepends_onattribute itself from being overridden. (#32796)terraform providers mirror: when a dependency lock file is present, mirror the resolved providers versions, not the latest available based on configuration. (#32749)TF_CLI_CONFIG_FILE(#32846)v1.4.0Compare Source
1.4.0 (March 08, 2023)
UPGRADE NOTES:
config: The
textencodebase64function when called with encoding "GB18030" will now encode the euro symbol € as the two-byte sequence0xA2,0xE3, as required by the GB18030 standard, before applying base64 encoding.config: The
textencodebase64function when called with encoding "GBK" or "CP936" will now encode the euro symbol € as the single byte0x80before applying base64 encoding. This matches the behavior of the Windows API when encoding to this Windows-specific character encoding.terraform init: When interpreting the hostname portion of a provider source address or the address of a module in a module registry, Terraform will now use non-transitional IDNA2008 mapping rules instead of the transitional mapping rules previously used.This matches a change to the WHATWG URL spec's rules for interpreting non-ASCII domain names which is being gradually adopted by web browsers. Terraform aims to follow the interpretation of hostnames used by web browsers for consistency. For some hostnames containing non-ASCII characters this may cause Terraform to now request a different "punycode" hostname when resolving.
terraform initwill now ignore entries in the optional global provider cache directory unless they match a checksum already tracked in the current configuration's dependency lock file. This therefore avoids the long-standing problem that when installing a new provider for the first time from the cache we can't determine the full set of checksums to include in the lock file. Once the lock file has been updated to include a checksum covering the item in the global cache, Terraform will then use the cache entry for subsequent installation of the same provider package. There is an interim CLI configuration opt-out for those who rely on the previous incorrect behavior. (#32129)The Terraform plan renderer has been completely rewritten to aid with future Terraform Cloud integration. Users should not see any material change in the plan output between 1.3 and 1.4. If you notice any significant differences, or if Terraform fails to plan successfully due to rendering problems, please open a bug report issue.
BUG FIXES:
yamldecodefunction now correctly handles entirely-nil YAML documents. Previously it would incorrectly return an unknown value instead of a null value. It will now return a null value as documented. (#32151)terraform workspacenow returns a non-zero exit when given an invalid argument (#31318)-jsonmode, messages will now be written in JSON format (#32451)ENHANCEMENTS:
terraform plancan now store a plan file even when encountering errors, which can later be inspected to help identify the source of the failures (#32395)terraform_datais a new builtin managed resource type, which can replace the use ofnull_resource, and can store data of any type (#31757)terraform initwill now ignore entries in the optional global provider cache directory unless they match a checksum already tracked in the current configuration's dependency lock file. This therefore avoids the long-standing problem that when installing a new provider for the first time from the cache we can't determine the full set of checksums to include in the lock file. Once the lock file has been updated to include a checksum covering the item in the global cache, Terraform will then use the cache entry for subsequent installation of the same provider package. There is an interim CLI configuration opt-out for those who rely on the previous incorrect behavior. (#32129)-or-createflag was added toterraform workspace select, to aid in creating workspaces in automated situations (#31633)terraform metadata functions -json(#32487)kms_encryption_keyargument, to allow encryption of state files using Cloud KMS keys. (#24967)storage_custom_endpointargument, to allow communication with the backend via a Private Service Connect endpoint. (#28856)gcswithterraform_remote_state(#32065)cloudbackendterraform workspace deletewill use Terraform Cloud's Safe Delete API if the-forceflag is not provided. (#31949)quietargument. Ifquietis set totrue, Terraform will not print the entire command to stdout during plan. (#32116)terraform showwill now print an explanation when called on a Terraform workspace with empty state detailing why no resources are shown. (#32629)GOOGLE_BACKEND_IMPERSONATE_SERVICE_ACCOUNTenv var to allow impersonating a different service account whenGOOGLE_IMPERSONATE_SERVICE_ACCOUNTis configured for the GCP provider. (#32557)assume_roleauthentication method with thetencentcloudprovider. This can be configured via the Terraform config or environment variables.security_tokenauthentication method with thetencentcloudprovider. This can be configured via the Terraform config or environment variables.EXPERIMENTS:
Since its introduction the
yamlencodefunction's documentation carried a warning that it was experimental. This predated our more formalized idea of language experiments and so wasn't guarded by an explicit opt-in, but the intention was to allow for small adjustments to its behavior if we learned it was producing invalid YAML in some cases, due to the relative complexity of the YAML specification.From Terraform v1.4 onwards,
yamlencodeis no longer documented as experimental and is now subject to the Terraform v1.x Compatibility Promises. There are no changes to its previous behavior in v1.3 and so no special action is required when upgrading.v1.3.9Compare Source
1.3.9 (February 15, 2023)
BUG FIXES:
v1.3.8Compare Source
1.3.8 (February 09, 2023)
BUG FIXES:
before_sensitive/after_sensitiveannotations in JSON plan output for deeply nested structures. This was only observed in the wild on the rancher/rancher2 provider, and resulted in glitched display in Terraform Cloud's structured plan log view. (#32543)v1.3.7Compare Source
1.3.7 (January 04, 2023)
BUG FIXES:
ignore_changes(#32428)v1.3.6Compare Source
1.3.6 (November 30, 2022)
BUG FIXES:
v1.3.5Compare Source
1.3.5 (November 17, 2022)
BUG FIXES:
(sensitive value)instead of sometimes as(sensitive)[GH32004]v1.3.4Compare Source
1.3.4 (November 02, 2022)
BUG FIXES:
consolewhen outputs contain preconditions (#32051)oidc_tokenandoidc_token_file_pathproperties (#31966)regex,regexall, andreplacefunctions, to avoid unbounded memory usage for maliciously-crafted patterns. This change should not affect any reasonable patterns intended for practical use. (#32135)v1.3.3Compare Source
1.3.3 (October 19, 2022)
BUG FIXES:
v1.3.2Compare Source
1.3.2 (October 06, 2022)
BUG FIXES:
ignore_changes = allcould cause persistent diffs with legacy providers (#31914)import(#31878)v1.3.1Compare Source
1.3.1 (September 28, 2022)
NOTE:
darwin/amd64anddarwin/arm64architectures,terraformbinaries are now built with CGO enabled. This should not have any user-facing impact, except in cases where the pure Go DNS resolver causes problems on recent versions of macOS: using CGO may mitigate these issues. Please see the upstream bug https://github.com/golang/go/issues/52839 for more details.BUG FIXES:
v1.3.0Compare Source
1.3.0 (September 21, 2022)
NEW FEATURES:
Optional attributes for object type constraints: When declaring an input variable whose type constraint includes an object type, you can now declare individual attributes as optional, and specify a default value to use if the caller doesn't set it. For example:
Assigning
{ a = "foo" }to this variable will result in the value{ a = "foo", b = null, c = 127 }.Added functions:
startswithandendswithallow you to check whether a given string has a specified prefix or suffix. (#31220)UPGRADE NOTES:
terraform show -json: Output changes now include more detail about the unknown-ness of the planned value. Previously, a planned output would be marked as either fully known or partially unknown, with theafter_unknownfield having valuefalseortruerespectively. Now outputs correctly expose the full structure of unknownness for complex values, allowing consumers of the JSON output format to determine which values in a collection are known only after apply.terraform import: The-allow-missing-confighas been removed, and at least an empty configuration block must exist to import a resource.Consumers of the JSON output format expecting on the
after_unknownfield to be onlyfalseortrueshould be updated to support the change representation described in the documentation, and as was already used for resource changes. (#31235)AzureRM Backend: This release concludes the deprecation cycle started in Terraform v1.1 for the
azurermbackend's support of "ADAL" authentication. This backend now supports only "MSAL" (Microsoft Graph) authentication.This follows from Microsoft's own deprecation of Azure AD Graph, and so you must follow the migration instructions presented in that Azure documentation to adopt Microsoft Graph and then change your backend configuration to use MSAL authentication before upgrading to Terraform v1.3.
When making requests to HTTPS servers, Terraform will now reject invalid handshakes that have duplicate extensions, as required by RFC 5246 section 7.4.1.4 and RFC 8446 section 4.2. This may cause new errors when interacting with existing buggy or misconfigured TLS servers, but should not affect correct servers.
This only applies to requests made directly by Terraform CLI, such as provider installation and remote state storage. Terraform providers are separate programs which decide their own policy for handling of TLS handshakes.
The following backends, which were deprecated in v1.2.3, have now been removed:
artifactory,etcd,etcdv3,manta,swift. The legacy backend nameazurehas also been removed, because the current Azure backend is namedazurerm. (#31711)ENHANCEMENTS:
timecmpallows determining the ordering relationship between two timestamps while taking potentially-different UTC offsets into account. (#31687)movedblocks can now describe resources moving to and from modules in separate module packages. (#31556)terraform fmtnow accepts multiple target paths, allowing formatting of several individual files at once. (#31687)terraform init: provider installation errors now mention which host Terraform was downloading from (#31524)PlanResourceChangefor compatible providers when destroying resource instances. (#31179)BUG FIXES:
terraform show -json: Fixed missing markers for unknown values in the encoding of partially unknown tuples and sets. (#31236)terraform outputCLI help documentation is now more consistent with web-based documentation. (#29354)terraform init: Error messages now handle the situation where the underlying HTTP client library does not indicate a hostname for a failed request. (#31542)terraform init: Don't panic if a child module contains a resource with a syntactically-invalid resource type name. (#31573)nulloutput values in a destroy plan will no longer report them as being deleted, which avoids reporting the deletion of an output value that was already absent. (#31471)terraform import: Better handling of resources or modules that usefor_each, and situations where data resources are needed to complete the operation. (#31283)EXPERIMENTS:
This release concludes the
module_variable_optional_attrsexperiment, which started in Terraform v0.14.0. The final design of the optional attributes feature is similar to the experimental form in the previous releases, but with two major differences:optionalfunction-like modifier for declaring an optional attribute now accepts an optional second argument for specifying a default value to use when the attribute isn't set by the caller. If not specified, the default value is a null value of the appropriate type as before.defaultsfunction, previously used to meet the use-case of replacing null values with default values, will not graduate to stable and has been removed. Use the second argument ofoptionalinline in your type constraint to declare default values instead.If you have any experimental modules that were participating in this experiment, you will need to remove the experiment opt-in and adopt the new syntax for declaring default values in order to migrate your existing module to the stablized version of this feature. If you are writing a shared module for others to use, we recommend declaring that your module requires Terraform v1.3.0 or later to give specific feedback when using the new feature on older Terraform versions, in place of the previous declaration to use the experimental form of this feature:
v1.2.9Compare Source
1.2.9 (September 07, 2022)
ENHANCEMENTS:
v1.2.8Compare Source
1.2.8 (August 24, 2022)
BUG FIXES:
flattenfunction will no longer panic if given a null value that has been explicitly converted to or implicitly inferred as having a list, set, or tuple type. Previously Terraform would panic in such a situation because it tried to "flatten" the contents of the null value into the result, which is impossible. (#31675)tolist,toset, andtomapfunctions, and various automatic conversions that include similar logic, will no longer panic when asked to infer an element type that is convertable from both a tuple type and a list type whose element type is not yet known. (#31675)v1.2.7Compare Source
1.2.7 (August 10, 2022)
ENHANCEMENTS:
BUG FIXES:
v1.2.6Compare Source
1.2.6 (July 27, 2022)
ENHANCEMENTS:
terraform initfails to fully populate the.terraform.lock.hclfile. (#31399)terraform initfails on missing checksums. (#31408)BUG FIXES:
terraform showwhen state file is invalid or unavailable. (#31444)terraform providers lockcommand failing on missing checksums. (#31389)ignore_changes(#31509)v1.2.5Compare Source
1.2.5 (July 13, 2022)
BUG FIXES:
required_versionglobal constraint. (#31331)v1.2.4Compare Source
1.2.4 (June 29, 2022)
ENHANCEMENTS:
required_providersto prevent single providers from being required with multiple names. (#31218)addrs.Module.Stringfor allocations. (#31293)BUG FIXES:
-lock-timeoutflag. (#31256)preconditionorpostconditionblock omitted the requiredconditionargument. (#31290)v1.2.3Compare Source
1.2.3 (June 15, 2022)
UPGRADE NOTES:
planned to be removed in a future Terraform release. These backends have
been unmaintained since before Terraform v1.0, and may contain known bugs,
outdated packages, or security vulnerabilities.
BUG FIXES:
tencentcloud-terraform-locktag was not removed in all cases (#31223)v1.2.2Compare Source
1.2.2 (June 01, 2022)
ENHANCEMENTS:
-vararguments with spaces between the name and value now have an improved error message (#30985)BUG FIXES:
v1.2.1Compare Source
1.2.1 (May 23, 2022)
BUG FIXES:
ed25519keys (#31092)countorfor_each(#31091)v1.2.0Compare Source
1.2.0 (May 18, 2022)
UPGRADE NOTES:
If you use the third-party credentials helper plugin terraform-credentials-env, you should disable it as part of upgrading to Terraform v1.2 because similar functionality is now built in to Terraform itself.
The new behavior supports the same environment variable naming scheme but has a difference in priority order from the credentials helper:
TF_TOKEN_...environment variables will now take priority over credentials blocks in CLI configuration and credentials stored automatically by terraform login, which is not true for credentials provided by any credentials helper plugin. If you see Terraform using different credentials after upgrading, check to make sure you do not specify credentials for the same host in multiple locations.If you use the credentials helper in conjunction with the hashicorp/tfe Terraform provider to manage Terraform Cloud or Terraform Enterprise objects with Terraform, you should also upgrade to version 0.31 of that provider, which added the corresponding built-in support for these environment variables.
The official Linux packages for the v1.2 series now require Linux kernel version 2.6.32 or later.
When making outgoing HTTPS or other TLS connections as a client, Terraform now requires the server to support TLS v1.2. TLS v1.0 and v1.1 are no longer supported. Any safely up-to-date server should support TLS 1.2, and mainstream web browsers have required it since 2020.
When making outgoing HTTPS or other TLS connections as a client, Terraform will no longer accept CA certificates signed using the SHA-1 hash function. Publicly trusted Certificate Authorities have not issued SHA-1 certificates since 2015.
(Note: the changes to Terraform's requirements when interacting with TLS servers apply only to requests made by Terraform CLI itself, such as provider/module installation and state storage requests. Terraform provider plugins include their own TLS clients which may have different requirements, and may add new requirements in their own releases, independently of Terraform CLI changes.)
NEW FEATURES:
preconditionandpostconditioncheck blocks for resources, data sources, and module output values: module authors can now document assumptions and assertions about configuration and state values. If these conditions are not met, Terraform will report a custom error message to the user and halt further execution.replace_triggered_byis a newlifecycleargument for managed resources which triggers replacement of an object based on changes to an upstream dependency.TF_TOKEN_followed by an encoded version of the hostname. For example, Terraform will use variableTF_TOKEN_app_terraform_ioas a bearer token for requests to "app.terraform.io", for the Terraform Cloud integration and private registry requests.ENHANCEMENTS:
-target. (#30327)TF_CLOUD_ORGANIZATIONandTF_CLOUD_HOSTNAMEnow serve as fallbacks for the arguments of the same name inside acloudblock configuring integration with Terraform Cloud.TF_WORKSPACEwill now additionally serve as an implicit configuration of a single selected workspace on Terraform Cloud if (and only if) thecloudblock does not include an explicit workspaces configuration.ignore_changesthat is managed only by the provider. Specifying non-configurable attributes inignore_changeshas no effect becauseignore_changestells Terraform to ignore future changes made in the configuration. (#30517)terraform show -jsonnow includes exact type information for output values. (#30945)sshprovisioner connection now supports SSH over HTTP proxy. (#30274)BUG FIXES:
tostring,tonumber, etc tonullwill now return a null value of the intended type. For example,tostring(null)converts from a null value of an unknown type to a null value of string type. Terraform can often handle such conversions automatically when needed, but explicit annotations like this can help Terraform to understand author intent when inferring type conversions for complex-typed values. (#30879)cidrnetmask()is called with an IPv6 address, as it was previously documented to do. IPv6 standards do not preserve the "netmask" syntax sometimes used for IPv4 network configuration; use CIDR prefix syntax instead. (#30703)terraform statecommands, Terraform now checks therequired_versionfield in the configuration before proceeding. (#30511)import,plan,refreshandapplyfor workspaces in local execution mode. This behavior applies to bothremotebackend and thecloudintegration configuration. (#29972)terraform show -json: JSON plan output now correctly maps aliased providers to their configurations, and includes the full provider source address alongside the short provider name. (#30138)cloudandremotebackend now has higher priority than a token specified in acredentialsblock in the CLI configuration. (#30664)cloudintegration now gracefully exits when-input=falseand an operation requires some user input.terraform apply -auto-approve. Previously there was a window of time where interruption would cancel the plan step but not prevent Terraform from proceeding to the apply step. (#30979)v1.1.9Compare Source
1.1.9 (April 20, 2022)
BUG FIXES:
ENHANCEMENTS:
v1.1.8Compare Source
1.1.8 (April 07, 2022)
BUG FIXES:
sum()function is called with a collection of string-encoded numbers, such assum(["1", "2", "3"]). (#30684)terraform applyphase if an error occurs during backend configuration. (#30780)v1.1.7Compare Source
1.1.7 (March 02, 2022)
BUG FIXES:
terraform show -json: Improve performance for deeply-nested object values. The previous implementation was accidentally quadratic, which could result in very long execution time for generating JSON plans, and timeouts on Terraform Cloud and Terraform Enterprise. (#30561)after migrating state to TFC.
v1.1.6Compare Source
1.1.6 (February 16, 2022)
BUG FIXES:
typefunction. This function may only be used at the top level of console expressions, to display the type of a given value. Attempting to use this function in complex expressions will now display a diagnostic error instead of crashing. (#30476)terraform state mv: Will now correctly exit with error code1when the specified resources cannot be found in state. Previously Terraform would display appropriate diagnostic errors, but exit successfully. (#29365)v1.1.5Compare Source
1.1.5 (February 02, 2022)
ENHANCEMENTS:
BUG FIXES:
terraform workspace select(#30193)v1.1.4Compare Source
1.1.4 (January 19, 2022)
BUG FIXES:
countto usingcount, or vice-versa. (#30333)v1.1.3Compare Source
1.1.3 (January 06, 2022)
BUG FIXES:
terraform init: Will now remove from the dependency lock file entries for providers not used in the current configuration. Previously it would leave formerly-used providers behind in the lock file, leading to "missing or corrupted provider plugins" errors when other commands verified the consistency of the installed plugins against the locked plugins. (#30192)movedblock refactoring to include nested modules (#30233)terraform show: Disable plan state lineage checks, ensuring that we can show plan files which were generated against non-default state files ([Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.