Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Terraform azuread to v2.53.1 #124

Merged
merged 1 commit into from
Sep 2, 2024
Merged

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented May 23, 2024

This PR contains the following updates:

Package Type Update Change
azuread (source) required_provider minor 2.49.1 -> 2.53.1

Release Notes

hashicorp/terraform-provider-azuread (azuread)

v2.53.1

Compare Source

BUG FIXES:

  • azuread_application - export the password attribute only when it is set in configuration, to prevent marking existing resources as sensitive (#​1422)

v2.53.0

Compare Source

ENHANCEMENTS:

  • azuread_application - support for the password block (#​1389)

BUG FIXES:

  • azuread_claims_mapping_policy - set the correct timeouts for this resource (#​1419)
  • azuread_service_principal_claims_mapping_policy_assignment - set the correct timeouts for this resource (#​1419)
  • azuread_synchronization_secret - set the correct timeouts for this resource (#​1419)

v2.52.0

Compare Source

BUG FIXES:

  • azuread_application - fix a bug that could prevent the ignore_changes lifecycle argument from working for the app_role, oauth2_permission_scope, identifier_uris, optional_claims, and required_resource_access properties (#​1403)
  • azuread_application - add a workaround for an API bug when instantiating an application from template using the template_id property (#​1406)

v2.51.0

Compare Source

ENHANCEMENTS:

  • data.azuread_users - support for the mails property (#​1400)

BUG FIXES:

  • azuread_access_package_assignment_policy - fix a bug preventing removal of the assignment_review_settings block (#​1394)

v2.50.0

Compare Source

ENHANCEMENTS:

  • dependencies: updating to v0.68.0 of github.com/manicminer/hamilton (#​1382)
  • data.azuread_application - support looking up applications with the identifier_uri property [GH 1303]
  • azuread_conditional_access_policy - improve handling of the session_controls block (#​1382)

BUG FIXES:

  • data.azuread_service_principal - treat the display_name property case-insensitively (#​1381)
  • azuread_conditional_access_policy - fix a bug that could cause a persistent diff when setting certain properties in the session_controls block (#​1382)
  • azuread_user - don't overwrite the existing password in state, when a password change fails (#​1308)

Configuration

📅 Schedule: Branch creation - "after 7am and before 11am every weekday" in timezone Europe/London, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner May 23, 2024 06:17
@renovate renovate bot enabled auto-merge (rebase) May 23, 2024 06:17
renovate-approve[bot]
renovate-approve bot previously approved these changes May 23, 2024
renovate-approve-2[bot]
renovate-approve-2 bot previously approved these changes May 23, 2024
Copy link
Contributor

hmcts-jenkins-cnp bot commented May 23, 2024

Plan Result (sbox)

Plan: 6 to add, 6 to change, 0 to destroy.
  • Create
    • azurerm_key_vault_secret.appInsights-InstrumentationKey
    • module.vault.azurerm_key_vault_access_policy.creator_access_policy
    • module.vault.azurerm_key_vault_access_policy.developer[0]
    • module.vault.azurerm_key_vault_access_policy.managed_identity_access_policy["60ab1441-a8a9-4990-aa30-c94e9f0b047b"]
    • module.vault.azurerm_key_vault_access_policy.product_team_access_policy
    • module.vault.azurerm_monitor_diagnostic_setting.kv-ds
  • Update
    • azurerm_resource_group.shared_resource_group
    • module.application_insights.azurerm_application_insights.this
    • module.application_insights.azurerm_monitor_activity_log_alert.main[0]
    • module.servicebus-namespace.azurerm_servicebus_namespace.servicebus_namespace
    • module.vault.azurerm_key_vault.kv
    • module.vault.azurerm_user_assigned_identity.managed_identity[0]
Change Result (Click me)
  # azurerm_key_vault_secret.appInsights-InstrumentationKey will be created
  + resource "azurerm_key_vault_secret" "appInsights-InstrumentationKey" {
      + id                      = (known after apply)
      + key_vault_id            = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox"
      + name                    = "appInsights-InstrumentationKey"
      + resource_id             = (known after apply)
      + resource_versionless_id = (known after apply)
      + value                   = (sensitive value)
      + version                 = (known after apply)
      + versionless_id          = (known after apply)
    }

  # azurerm_resource_group.shared_resource_group will be updated in-place
  ~ resource "azurerm_resource_group" "shared_resource_group" {
        id         = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox"
        name       = "apple-shared-infrastructure-sbox"
      ~ tags       = {
            "application"         = "core"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
            "businessArea"        = "Cross-Cutting"
            "contactSlackChannel" = "#platops-help"
            "environment"         = "sandbox"
          ~ "expiresAfter"        = "2024-09-16" -> "3000-01-01"
            "managedBy"           = "Platform Operations"
            "startupMode"         = "onDemand"
        }
        # (2 unchanged attributes hidden)
    }

  # module.application_insights.azurerm_application_insights.this will be updated in-place
  ~ resource "azurerm_application_insights" "this" {
        id                                    = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.Insights/components/apple-sbox"
        name                                  = "apple-sbox"
      ~ tags                                  = {
            "application"         = "core"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
            "businessArea"        = "Cross-Cutting"
            "contactSlackChannel" = "#platops-help"
            "environment"         = "sandbox"
          ~ "expiresAfter"        = "2024-09-16" -> "3000-01-01"
            "managedBy"           = "Platform Operations"
            "startupMode"         = "onDemand"
        }
        # (16 unchanged attributes hidden)
    }

  # module.application_insights.azurerm_monitor_activity_log_alert.main[0] will be updated in-place
  ~ resource "azurerm_monitor_activity_log_alert" "main" {
        id                  = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.Insights/activityLogAlerts/Application Insights daily cap reached - apple-sbox"
        name                = "Application Insights daily cap reached - apple-sbox"
      ~ tags                = {
            "application"         = "core"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
            "businessArea"        = "Cross-Cutting"
            "contactSlackChannel" = "#platops-help"
            "environment"         = "sandbox"
          ~ "expiresAfter"        = "2024-09-16" -> "3000-01-01"
            "managedBy"           = "Platform Operations"
            "startupMode"         = "onDemand"
        }
        # (5 unchanged attributes hidden)

        # (2 unchanged blocks hidden)
    }

  # module.servicebus-namespace.azurerm_servicebus_namespace.servicebus_namespace will be updated in-place
  ~ resource "azurerm_servicebus_namespace" "servicebus_namespace" {
        id                                  = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.ServiceBus/namespaces/apple-servicebus-sbox"
        name                                = "apple-servicebus-sbox"
      ~ tags                                = {
            "application"         = "core"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
            "businessArea"        = "Cross-Cutting"
            "contactSlackChannel" = "#platops-help"
            "environment"         = "sandbox"
          ~ "expiresAfter"        = "2024-09-16" -> "3000-01-01"
            "managedBy"           = "Platform Operations"
            "startupMode"         = "onDemand"
        }
        # (14 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

  # module.vault.azurerm_key_vault.kv will be updated in-place
  ~ resource "azurerm_key_vault" "kv" {
        id                              = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox"
        name                            = "applesi-sbox"
      ~ tags                            = {
            "application"         = "core"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
            "businessArea"        = "Cross-Cutting"
            "contactSlackChannel" = "#platops-help"
            "environment"         = "sandbox"
          ~ "expiresAfter"        = "2024-09-16" -> "3000-01-01"
            "managedBy"           = "Platform Operations"
            "startupMode"         = "onDemand"
        }
        # (13 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

  # module.vault.azurerm_key_vault_access_policy.creator_access_policy will be created
  + resource "azurerm_key_vault_access_policy" "creator_access_policy" {
      + certificate_permissions = [
          + "Create",
          + "Delete",
          + "DeleteIssuers",
          + "Get",
          + "GetIssuers",
          + "Import",
          + "List",
          + "ListIssuers",
          + "SetIssuers",
          + "Update",
          + "ManageContacts",
          + "ManageIssuers",
        ]
      + id                      = (known after apply)
      + key_permissions         = [
          + "Create",
          + "List",
          + "Get",
          + "Delete",
          + "Update",
          + "Import",
          + "Backup",
          + "Restore",
          + "Decrypt",
          + "Encrypt",
          + "UnwrapKey",
          + "WrapKey",
          + "Sign",
          + "Verify",
          + "GetRotationPolicy",
        ]
      + key_vault_id            = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox"
      + object_id               = "5356a0e7-324e-4efa-970b-4b4aec3f0ba3"
      + secret_permissions      = [
          + "Set",
          + "List",
          + "Get",
          + "Delete",
          + "Recover",
          + "Purge",
        ]
      + tenant_id               = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
    }

  # module.vault.azurerm_key_vault_access_policy.developer[0] will be created
  + resource "azurerm_key_vault_access_policy" "developer" {
      + certificate_permissions = [
          + "Get",
          + "List",
        ]
      + id                      = (known after apply)
      + key_permissions         = [
          + "Get",
          + "List",
        ]
      + key_vault_id            = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox"
      + object_id               = "7bde62e7-b39f-487c-95c9-b4c794fdbb96"
      + secret_permissions      = [
          + "Get",
          + "List",
        ]
      + tenant_id               = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
    }

  # module.vault.azurerm_key_vault_access_policy.managed_identity_access_policy["60ab1441-a8a9-4990-aa30-c94e9f0b047b"] will be created
  + resource "azurerm_key_vault_access_policy" "managed_identity_access_policy" {
      + certificate_permissions = [
          + "Get",
          + "List",
        ]
      + id                      = (known after apply)
      + key_permissions         = [
          + "Get",
          + "List",
        ]
      + key_vault_id            = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox"
      + object_id               = "60ab1441-a8a9-4990-aa30-c94e9f0b047b"
      + secret_permissions      = [
          + "Get",
          + "List",
        ]
      + tenant_id               = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
    }

  # module.vault.azurerm_key_vault_access_policy.product_team_access_policy will be created
  + resource "azurerm_key_vault_access_policy" "product_team_access_policy" {
      + certificate_permissions = [
          + "List",
          + "Update",
          + "Create",
          + "Import",
          + "Delete",
          + "ManageContacts",
          + "ManageIssuers",
          + "GetIssuers",
          + "ListIssuers",
          + "SetIssuers",
          + "DeleteIssuers",
          + "Recover",
        ]
      + id                      = (known after apply)
      + key_permissions         = [
          + "List",
          + "Update",
          + "Create",
          + "Import",
          + "Delete",
          + "Recover",
        ]
      + key_vault_id            = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox"
      + object_id               = "e7ea2042-4ced-45dd-8ae3-e051c6551789"
      + secret_permissions      = [
          + "List",
          + "Set",
          + "Delete",
          + "Recover",
        ]
      + tenant_id               = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
    }

  # module.vault.azurerm_monitor_diagnostic_setting.kv-ds will be created
  + resource "azurerm_monitor_diagnostic_setting" "kv-ds" {
      + id                             = (known after apply)
      + log_analytics_destination_type = (known after apply)
      + log_analytics_workspace_id     = "/subscriptions/bf308a5c-0624-4334-8ff8-8dca9fd43783/resourceGroups/oms-automation/providers/Microsoft.OperationalInsights/workspaces/hmcts-sandbox"
      + name                           = "applesi-sbox"
      + target_resource_id             = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox"

      + enabled_log {
          + category       = "AuditEvent"
            # (1 unchanged attribute hidden)
        }

      + log (known after apply)
    }

  # module.vault.azurerm_user_assigned_identity.managed_identity[0] will be updated in-place
  ~ resource "azurerm_user_assigned_identity" "managed_identity" {
        id                  = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/managed-identities-sbox-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/apple-sbox-mi"
        name                = "apple-sbox-mi"
      ~ tags                = {
            "application"         = "core"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
            "businessArea"        = "Cross-Cutting"
            "contactSlackChannel" = "#platops-help"
            "environment"         = "sandbox"
          ~ "expiresAfter"        = "2024-09-16" -> "3000-01-01"
            "managedBy"           = "Platform Operations"
            "startupMode"         = "onDemand"
        }
        # (5 unchanged attributes hidden)
    }

Plan: 6 to add, 6 to change, 0 to destroy.

Copy link
Contributor

hmcts-jenkins-cnp bot commented May 23, 2024

Plan Result (stg)

No changes. Your infrastructure matches the configuration.

Copy link
Contributor

hmcts-jenkins-cnp bot commented May 23, 2024

Plan Result (prod)

No changes. Your infrastructure matches the configuration.

@renovate renovate bot changed the title Update Terraform azuread to v2.50.0 Update Terraform azuread to v2.51.0 Jun 7, 2024
@renovate renovate bot changed the title Update Terraform azuread to v2.51.0 Update Terraform azuread to v2.52.0 Jun 14, 2024
@renovate renovate bot changed the title Update Terraform azuread to v2.52.0 Update Terraform azuread to v2.53.0 Jun 28, 2024
Copy link

infracost bot commented Jun 28, 2024

Infracost free monthly run limit exceeded. Please contact [email protected] to purchase usage pack.: 403 Forbidden Infracost free monthly run limit exceeded. Please contact [email protected] to purchase usage pack.

renovate-approve[bot]
renovate-approve bot previously approved these changes Sep 2, 2024
renovate-approve-2[bot]
renovate-approve-2 bot previously approved these changes Sep 2, 2024
@renovate renovate bot changed the title Update Terraform azuread to v2.53.0 Update Terraform azuread to v2.53.1 Sep 2, 2024
@renovate renovate bot merged commit e906ad8 into master Sep 2, 2024
1 check passed
@renovate renovate bot deleted the renovate/azuread-2.x branch September 2, 2024 14:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant