-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update dependency hashicorp/terraform to v1.9.5 #128
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Plan Result (stg)
Change Result (Click me) # module.application_insights.azurerm_monitor_activity_log_alert.main has moved to module.application_insights.azurerm_monitor_activity_log_alert.main[0]
resource "azurerm_monitor_activity_log_alert" "main" {
id = "/subscriptions/74dacd4f-a248-45bb-a2f0-af700dc4cf68/resourceGroups/toffee-shared-infrastructure-stg/providers/Microsoft.Insights/activityLogAlerts/Application Insights daily cap reached - toffee-stg"
name = "Application Insights daily cap reached - toffee-stg"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "staging"
"managedBy" = "Platform Operations"
}
# (5 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
Plan: 0 to add, 0 to change, 0 to destroy. |
Plan Result (prod)
Change Result (Click me) # module.application_insights.azurerm_monitor_activity_log_alert.main has moved to module.application_insights.azurerm_monitor_activity_log_alert.main[0]
resource "azurerm_monitor_activity_log_alert" "main" {
id = "/subscriptions/5ca62022-6aa2-4cee-aaa7-e7536c8d566c/resourceGroups/toffee-shared-infrastructure-prod/providers/Microsoft.Insights/activityLogAlerts/Application Insights daily cap reached - toffee-prod"
name = "Application Insights daily cap reached - toffee-prod"
tags = {
"application" = "core"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "production"
"managedBy" = "Platform Operations"
}
# (5 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
Plan: 0 to add, 0 to change, 0 to destroy. |
Plan Result (sbox)
Change Result (Click me) # azurerm_key_vault_secret.appInsights-InstrumentationKey will be created
+ resource "azurerm_key_vault_secret" "appInsights-InstrumentationKey" {
+ id = (known after apply)
+ key_vault_id = (known after apply)
+ name = "appInsights-InstrumentationKey"
+ resource_id = (known after apply)
+ resource_versionless_id = (known after apply)
+ value = (sensitive value)
+ version = (known after apply)
+ versionless_id = (known after apply)
}
# azurerm_resource_group.shared_resource_group will be created
+ resource "azurerm_resource_group" "shared_resource_group" {
+ id = (known after apply)
+ location = "uksouth"
+ name = "apple-shared-infrastructure-sbox"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
}
# azurerm_role_assignment.keda_servicebus_data_receiver will be created
+ resource "azurerm_role_assignment" "keda_servicebus_data_receiver" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "b305926a-0ed4-47b2-9fd4-0aecf1212537"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Azure Service Bus Data Receiver"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
# azurerm_role_assignment.platops_servicebus_data_owner will be created
+ resource "azurerm_role_assignment" "platops_servicebus_data_owner" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "e7ea2042-4ced-45dd-8ae3-e051c6551789"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Azure Service Bus Data Owner"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
# azurerm_role_assignment.toffee_servicebus_data_receiver will be created
+ resource "azurerm_role_assignment" "toffee_servicebus_data_receiver" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = (known after apply)
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Azure Service Bus Data Receiver"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
# azurerm_servicebus_queue.this will be created
+ resource "azurerm_servicebus_queue" "this" {
+ auto_delete_on_idle = (known after apply)
+ dead_lettering_on_message_expiration = false
+ default_message_ttl = (known after apply)
+ duplicate_detection_history_time_window = (known after apply)
+ enable_batched_operations = true
+ enable_express = false
+ enable_partitioning = false
+ id = (known after apply)
+ lock_duration = (known after apply)
+ max_delivery_count = 10
+ max_message_size_in_kilobytes = (known after apply)
+ max_size_in_megabytes = (known after apply)
+ name = "recipes"
+ namespace_id = (known after apply)
+ requires_duplicate_detection = false
+ requires_session = false
+ status = "Active"
}
# module.application_insights.azurerm_application_insights.this will be created
+ resource "azurerm_application_insights" "this" {
+ app_id = (known after apply)
+ application_type = "web"
+ connection_string = (sensitive value)
+ daily_data_cap_in_gb = 50
+ daily_data_cap_notifications_disabled = true
+ disable_ip_masking = false
+ force_customer_storage_for_profiler = false
+ id = (known after apply)
+ instrumentation_key = (sensitive value)
+ internet_ingestion_enabled = true
+ internet_query_enabled = true
+ local_authentication_disabled = false
+ location = "uksouth"
+ name = "apple-sbox"
+ resource_group_name = "apple-shared-infrastructure-sbox"
+ retention_in_days = 90
+ sampling_percentage = 100
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ workspace_id = "/subscriptions/bf308a5c-0624-4334-8ff8-8dca9fd43783/resourceGroups/oms-automation/providers/Microsoft.OperationalInsights/workspaces/hmcts-sandbox"
}
# module.application_insights.azurerm_monitor_activity_log_alert.main[0] will be created
# (moved from module.application_insights.azurerm_monitor_activity_log_alert.main)
+ resource "azurerm_monitor_activity_log_alert" "main" {
+ description = "Monitors for application insight reaching it's daily cap."
+ enabled = true
+ id = (known after apply)
+ location = "global"
+ name = "Application Insights daily cap reached - apple-sbox"
+ resource_group_name = "apple-shared-infrastructure-sbox"
+ scopes = (known after apply)
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ action {
+ action_group_id = "/subscriptions/6c4d2513-a873-41b4-afdd-b05a33206631/resourceGroups/sds-alerts-slack-ptl/providers/Microsoft.Insights/actiongroups/sds-alerts-slack-warning-alerts"
+ webhook_properties = {
+ "from" = "terraform"
+ "slackChannelId" = "C8SR5CAMU"
}
}
+ criteria {
+ category = "Administrative"
+ level = "Warning"
+ operation_name = "Microsoft.Insights/Components/DailyCapReached/Action"
+ resource_id = (known after apply)
+ resource_health (known after apply)
+ service_health (known after apply)
}
}
# module.servicebus-namespace.azurerm_servicebus_namespace.servicebus_namespace will be created
+ resource "azurerm_servicebus_namespace" "servicebus_namespace" {
+ capacity = 0
+ default_primary_connection_string = (sensitive value)
+ default_primary_key = (sensitive value)
+ default_secondary_connection_string = (sensitive value)
+ default_secondary_key = (sensitive value)
+ endpoint = (known after apply)
+ id = (known after apply)
+ local_auth_enabled = true
+ location = "uksouth"
+ minimum_tls_version = (known after apply)
+ name = "apple-servicebus-sbox"
+ premium_messaging_partitions = 0
+ public_network_access_enabled = true
+ resource_group_name = "apple-shared-infrastructure-sbox"
+ sku = "Basic"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ zone_redundant = false
+ network_rule_set (known after apply)
}
# module.servicebus-namespace.azurerm_servicebus_namespace_authorization_rule.send_listen_auth_rule will be created
+ resource "azurerm_servicebus_namespace_authorization_rule" "send_listen_auth_rule" {
+ id = (known after apply)
+ listen = true
+ manage = false
+ name = "SendAndListenSharedAccessKey"
+ namespace_id = (known after apply)
+ primary_connection_string = (sensitive value)
+ primary_connection_string_alias = (sensitive value)
+ primary_key = (sensitive value)
+ secondary_connection_string = (sensitive value)
+ secondary_connection_string_alias = (sensitive value)
+ secondary_key = (sensitive value)
+ send = true
}
# module.vault.azurerm_key_vault.kv will be created
+ resource "azurerm_key_vault" "kv" {
+ access_policy = (known after apply)
+ enabled_for_deployment = true
+ enabled_for_disk_encryption = true
+ enabled_for_template_deployment = true
+ id = (known after apply)
+ location = "uksouth"
+ name = "applesi-sbox"
+ public_network_access_enabled = true
+ purge_protection_enabled = true
+ resource_group_name = "apple-shared-infrastructure-sbox"
+ sku_name = "standard"
+ soft_delete_retention_days = 90
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
+ vault_uri = (known after apply)
+ contact (known after apply)
+ network_acls {
+ bypass = "AzureServices"
+ default_action = "Allow"
}
}
# module.vault.azurerm_key_vault_access_policy.creator_access_policy will be created
+ resource "azurerm_key_vault_access_policy" "creator_access_policy" {
+ certificate_permissions = [
+ "Create",
+ "Delete",
+ "DeleteIssuers",
+ "Get",
+ "GetIssuers",
+ "Import",
+ "List",
+ "ListIssuers",
+ "SetIssuers",
+ "Update",
+ "ManageContacts",
+ "ManageIssuers",
]
+ id = (known after apply)
+ key_permissions = [
+ "Create",
+ "List",
+ "Get",
+ "Delete",
+ "Update",
+ "Import",
+ "Backup",
+ "Restore",
+ "Decrypt",
+ "Encrypt",
+ "UnwrapKey",
+ "WrapKey",
+ "Sign",
+ "Verify",
+ "GetRotationPolicy",
]
+ key_vault_id = (known after apply)
+ object_id = "5356a0e7-324e-4efa-970b-4b4aec3f0ba3"
+ secret_permissions = [
+ "Set",
+ "List",
+ "Get",
+ "Delete",
+ "Recover",
+ "Purge",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_key_vault_access_policy.developer[0] will be created
+ resource "azurerm_key_vault_access_policy" "developer" {
+ certificate_permissions = [
+ "Get",
+ "List",
]
+ id = (known after apply)
+ key_permissions = [
+ "Get",
+ "List",
]
+ key_vault_id = (known after apply)
+ object_id = "7bde62e7-b39f-487c-95c9-b4c794fdbb96"
+ secret_permissions = [
+ "Get",
+ "List",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_key_vault_access_policy.implicit_managed_identity_access_policy[0] will be created
+ resource "azurerm_key_vault_access_policy" "implicit_managed_identity_access_policy" {
+ certificate_permissions = [
+ "Get",
+ "List",
]
+ id = (known after apply)
+ key_permissions = [
+ "Get",
+ "List",
]
+ key_vault_id = (known after apply)
+ object_id = (known after apply)
+ secret_permissions = [
+ "Get",
+ "List",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_key_vault_access_policy.managed_identity_access_policy["60ab1441-a8a9-4990-aa30-c94e9f0b047b"] will be created
+ resource "azurerm_key_vault_access_policy" "managed_identity_access_policy" {
+ certificate_permissions = [
+ "Get",
+ "List",
]
+ id = (known after apply)
+ key_permissions = [
+ "Get",
+ "List",
]
+ key_vault_id = (known after apply)
+ object_id = "60ab1441-a8a9-4990-aa30-c94e9f0b047b"
+ secret_permissions = [
+ "Get",
+ "List",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_key_vault_access_policy.product_team_access_policy will be created
+ resource "azurerm_key_vault_access_policy" "product_team_access_policy" {
+ certificate_permissions = [
+ "List",
+ "Update",
+ "Create",
+ "Import",
+ "Delete",
+ "ManageContacts",
+ "ManageIssuers",
+ "GetIssuers",
+ "ListIssuers",
+ "SetIssuers",
+ "DeleteIssuers",
+ "Recover",
]
+ id = (known after apply)
+ key_permissions = [
+ "List",
+ "Update",
+ "Create",
+ "Import",
+ "Delete",
+ "Recover",
]
+ key_vault_id = (known after apply)
+ object_id = "e7ea2042-4ced-45dd-8ae3-e051c6551789"
+ secret_permissions = [
+ "List",
+ "Set",
+ "Delete",
+ "Recover",
]
+ tenant_id = "531ff96d-0ae9-462a-8d2d-bec7c0b42082"
}
# module.vault.azurerm_monitor_diagnostic_setting.kv-ds will be created
+ resource "azurerm_monitor_diagnostic_setting" "kv-ds" {
+ id = (known after apply)
+ log_analytics_destination_type = (known after apply)
+ log_analytics_workspace_id = "/subscriptions/bf308a5c-0624-4334-8ff8-8dca9fd43783/resourceGroups/oms-automation/providers/Microsoft.OperationalInsights/workspaces/hmcts-sandbox"
+ name = "applesi-sbox"
+ target_resource_id = (known after apply)
+ enabled_log {
+ category = "AuditEvent"
# (1 unchanged attribute hidden)
}
+ log (known after apply)
}
# module.vault.azurerm_user_assigned_identity.managed_identity[0] will be created
+ resource "azurerm_user_assigned_identity" "managed_identity" {
+ client_id = (known after apply)
+ id = (known after apply)
+ location = "uksouth"
+ name = "apple-sbox-mi"
+ principal_id = (known after apply)
+ resource_group_name = "managed-identities-sbox-rg"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
+ "businessArea" = "Cross-Cutting"
+ "contactSlackChannel" = "#platops-help"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "managedBy" = "Platform Operations"
+ "startupMode" = "onDemand"
}
+ tenant_id = (known after apply)
}
Plan: 18 to add, 0 to change, 0 to destroy. ℹ️ Objects have changed outside of TerraformThis feature was introduced from Terraform v0.15.4. Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# azurerm_resource_group.shared_resource_group has been deleted
- resource "azurerm_resource_group" "shared_resource_group" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox"
- name = "apple-shared-infrastructure-sbox" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
# (2 unchanged attributes hidden)
}
# module.application_insights.azurerm_application_insights.this has been deleted
- resource "azurerm_application_insights" "this" {
- app_id = "85714c4a-5ff3-47d0-9b3e-3bac0ca8a5a5" -> null
- connection_string = (sensitive value) -> null
- id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.Insights/components/apple-sbox" -> null
- instrumentation_key = (sensitive value) -> null
- name = "apple-sbox" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
# (13 unchanged attributes hidden)
}
# module.servicebus-namespace.azurerm_servicebus_namespace.servicebus_namespace has been deleted
- resource "azurerm_servicebus_namespace" "servicebus_namespace" {
- id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.ServiceBus/namespaces/apple-servicebus-sbox" -> null
- name = "apple-servicebus-sbox" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
# (14 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# module.servicebus-namespace.azurerm_servicebus_namespace_authorization_rule.send_listen_auth_rule has been deleted
- resource "azurerm_servicebus_namespace_authorization_rule" "send_listen_auth_rule" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.ServiceBus/namespaces/apple-servicebus-sbox/authorizationRules/SendAndListenSharedAccessKey"
name = "SendAndListenSharedAccessKey"
- primary_connection_string = (sensitive value) -> null
- primary_key = (sensitive value) -> null
- secondary_connection_string = (sensitive value) -> null
- secondary_key = (sensitive value) -> null
# (6 unchanged attributes hidden)
}
# module.vault.azurerm_key_vault.kv has been deleted
- resource "azurerm_key_vault" "kv" {
- id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/apple-shared-infrastructure-sbox/providers/Microsoft.KeyVault/vaults/applesi-sbox" -> null
- name = "applesi-sbox" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
- vault_uri = "https://applesi-sbox.vault.azure.net/" -> null
# (12 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# module.vault.azurerm_user_assigned_identity.managed_identity[0] has been deleted
- resource "azurerm_user_assigned_identity" "managed_identity" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/managed-identities-sbox-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/apple-sbox-mi"
name = "apple-sbox-mi"
- principal_id = "0bda41cb-d7e5-4f9f-98a5-d0cf156d6328" -> null
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/sds-toffee-shared-infrastructure.git"
"businessArea" = "Cross-Cutting"
"contactSlackChannel" = "#platops-help"
"environment" = "sandbox"
"expiresAfter" = "2024-06-22"
"managedBy" = "Platform Operations"
"startupMode" = "onDemand"
}
# (4 unchanged attributes hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the |
renovate
bot
dismissed stale reviews from renovate-approve-2[bot] and renovate-approve[bot]
via
September 2, 2024 05:42
62b989f
renovate
bot
dismissed stale reviews from renovate-approve-2[bot] and renovate-approve[bot]
via
September 2, 2024 14:02
e3c0963
renovate
bot
force-pushed
the
renovate/terraform-monorepo
branch
from
September 2, 2024 14:02
62b989f
to
e3c0963
Compare
hmcts-jenkins-cnp
bot
dismissed stale reviews from renovate-approve-2[bot] and renovate-approve[bot]
via
September 2, 2024 14:03
7b3b91e
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
hannah38
approved these changes
Sep 2, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.8.3
->1.9.5
Release Notes
hashicorp/terraform (hashicorp/terraform)
v1.9.5
Compare Source
1.9.5 (August 20, 2024)
ENHANCEMENTS:
BUG FIXES:
removed
blocks with provisioners were not executed when the resource was in a nested module. (#35611)v1.9.4
Compare Source
1.9.4 (August 7, 2024)
BUG FIXES:
v1.9.3
Compare Source
1.9.3 (July 24, 2024)
ENHANCEMENTS:
condition
returnedfalse
) but the error message is derived from an unknown value. (#35400)BUG FIXES:
removed
block. (#35458)v1.9.2
Compare Source
1.9.2 (July 10, 2024)
BUG FIXES:
count
andfor_each
meta attributes. (#35432)v1.9.1
Compare Source
1.9.1 (Unreleased)
UPGRADE NOTES:
terraform init
orterraform get
in case of larger git repositories. Please do file an issue if you find the performance difference noticable. (#35376)BUG FIXES:
terraform test
: Removed additional erroneous error message when referencing attributes that don't exist. (#35408)import
blocks: Fix crash that occurs when incorrectly referencing theto
resource from theid
attribute. (#35420)v1.9.0
Compare Source
v1.8.5
Compare Source
1.8.5 (June 5, 2024)
BUG FIXES:
terraform test
: Remove duplicate warning diagnostic when providing values for unknown variables in run blocks. (#35172)v1.8.4
Compare Source
1.8.4 (May 22, 2024)
BUG FIXES:
core
: Fix exponential slowdown in some cases when modules are usingdepends_on
. (#35157)import
blocks: Fix bug where resources with nested, computed, and optionalid
attributes would fail to generate configuration. (#35220)golang.org/x/net
release, which addressed CVE-2023-45288 (#35165)Configuration
📅 Schedule: Branch creation - "after 7am and before 11am every weekday" in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.