Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update dependency hashicorp/terraform to v1.6.4 (terraform/dockerfile) (master) #715

Merged

Conversation

ivankatliarchuk
Copy link
Member

@ivankatliarchuk ivankatliarchuk commented Jun 16, 2023

This PR contains the following updates:

Package Update Change
hashicorp/terraform minor 1.4.6 -> 1.6.4

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

hashicorp/terraform (hashicorp/terraform)

v1.6.4

Compare Source

1.6.4 (November 15, 2023)

ENHANCEMENTS:

  • backend/s3: Add the parameter endpoints.sso to allow overriding the AWS SSO API endpoint. (#​34195)

BUG FIXES:

  • terraform test: Fix bug preventing passing sensitive output values from previous run blocks as inputs to future run blocks. (#​34190)
  • backend/s3: Add https_proxy and no_proxy parameters to allow fully specifying proxy configuration (#​34243)

v1.6.3

Compare Source

1.6.3 (November 1, 2023)

ENHANCEMENTS:

  • backend/s3: Adds the parameter skip_s3_checksum to allow users to disable checksum on S3 uploads for compatibility with "S3-compatible" APIs. (#​34127)

v1.6.2

Compare Source

1.6.2 (October 18, 2023)

BUG FIXES

  • terraform test: Fix performance issues when using provisioners within configs being tested. (#​34026)
  • terraform test: Only process and parse relevant variables for each run block. (#​34072)
  • Fix occasional crash when destroying configurations with variables containing validations. (#​34101)
  • Fix interoperability issues between v1.6 series and earlier series by removing variable validations from the state file (#​34058).
  • cloud: Fixes panic when saving state in Terraform Cloud when certain types of API errors are returned (#​34074).
  • config: Fix crash in conditional statements with certain combinations of unknown values. Improve handling of refined values into the conditional expression results (#​34096)
  • config: Update HCL to fix bug when decoding objects with optional attributes (#​34108)
  • backend/s3: Some configurations would require -reconfigure during each init when config was not decoded correctly (#​34108)

v1.6.1

Compare Source

1.6.1 (October 10, 2023)

ENHANCEMENTS:

  • backend/s3: The skip_requesting_account_id argument supports AWS API implementations that do not have the IAM, STS, or metadata API. (#​34002)

BUG FIXES:

  • config: Using sensitive values as one or both of the results of a conditional expression will no longer crash. [GH-33996]
  • config: Conditional expression returning refined-non-null result will no longer crash. [GH-33996]
  • cli: Reverted back to previous behavior of ignoring signing key expiration for provider installation, since it's the provider registry's responsibility to verify key validity at publication time. [GH-34004]
  • cli: GIT_SSH_COMMAND is now preserved again when fetching modules from git source addresses. [GH-34045]
  • cloud: The TF_WORKSPACE environment variable works with the cloud block again; it can specify a workspace when none is configured, or select an active workspace when the config specifies tags. [GH-34012]
  • backend/s3: S3, DynamoDB, IAM, and STS endpoint parameters will no longer fail validation if the parsed scheme or hostname is empty. (#​34017)
  • backend/s3: Providing a key alias to the kms_key_id argument will no longer fail validation. (#​33993)

v1.6.0

Compare Source

1.6.0 (October 4, 2023)

UPGRADE NOTES:

  • On macOS, Terraform now requires macOS 10.15 Catalina or later; support for previous versions has been discontinued.
  • On Windows, Terraform now requires at least Windows 10 or Windows Server 2016; support for previous versions has been discontinued.
  • The S3 backend has a number of significant changes to its configuration format in this release, intended to match with recent changes in the hashicorp/aws provider:
    • Configuration settings related to assuming IAM roles now belong to a nested block assume_role. The top-level arguments role_arn, session_name, external_id, assume_role_duration_seconds, assume_role_policy_arns, assume_role_tags, and assume_role_transitive_tag_keys are all now deprecated in favor of the nested equivalents. (#​30495)
    • Configuration settings related to overriding the locations of AWS service endpoints used by the provider now belong to a nested block endpoints. The top-level arguments dynamodb_endpoint, iam_endpoint, endpoint (fir S3), and sts_endpoint are now deprecated in favor of the nested equivalents. (#​30492)
    • The backend now uses the following environment variables for overriding the default locations of AWS service endpoints used by the provider: AWS_ENDPOINT_URL_DYNAMODB, AWS_ENDPOINT_URL_IAM, AWS_ENDPOINT_URL_S3, and AWS_ENDPOINT_URL_STS. The old non-standard names for these environment variables are now deprecated: AWS_DYNAMODB_ENDPOINT, AWS_IAM_ENDPOINT, AWS_S3_ENDPOINT, and AWS_STS_ENDPOINT. (#​30479)
    • The singular shared_credentials_file argument is deprecated in favor of the plural shared_credentials_files.
    • The force_path_style argument is deprecated in favor of use_path_style for consistency with the AWS SDK. (#​30491)

NEW FEATURES:

  • terraform test: The terraform test command is now generally available. This comes with a significant change to how tests are written and executed, based on feedback from the experimental phase.

    Terraform tests are written in .tftest.hcl files, containing a series of run blocks. Each run block executes a Terraform plan and optional apply against the Terraform configuration under test and can check conditions against the resulting plan and state.

ENHANCEMENTS:

  • config: The import block id field now accepts expressions referring to other values such as resource attributes, as long as the value is a string known at plan time. (#​33618)

  • Terraform Cloud integration: Remote plans on Terraform Cloud/Enterprise can now be saved using the -out option, viewed using terraform show, and applied using terraform apply with the saved plan filename. (#​33492)

  • config: Terraform can now track some additional detail about values that won't be known until the apply step, such as the range of possible lengths for a collection or whether an unknown value can possibly be null.

  • core: Provider schemas can now be cached globally for compatible providers, allowing them to be reused throughout core without requesting them for each new provider instance. This can significantly reduce memory usage when there are many instances of the same provider in a single configuration (#​33482)

    When this information is available, Terraform can potentially generate known results for some operations on unknown values. This doesn't mean that Terraform can immediately track that detail in all cases, but the type system now supports that and so over time we can improve the level of detail generated by built-in functions, language operators, Terraform providers, etc. (#​33234)

  • config: The try and can functions can now return more precise and consistent results when faced with unknown arguments (#​33758)

  • terraform show -json: Now includes errored property, indicating whether the planning process halted with an error. An errored plan is not applyable. (#​33372)

  • core: Terraform will now skip requesting the (possibly very large) provider schema from providers which indicate during handshake that they don't require that for correct behavior, in situations where Terraform Core itself does not need the schema. (#​33486)

  • backend/kubernetes: The Kubernetes backend is no longer limited to storing states below 1MiB in size, and can now scale by splitting state across multiple secrets. (#​29678)

  • backend/s3: Various improvements for consistency with hashicorp/aws provider capabilities:

    • assume_role_with_web_identity nested block for assuming a role with dynamic credentials such as a JSON Web Token. (#​31244)
    • Now honors the standard AWS environment variables for credential and configuration files: AWS_CONFIG_FILE and AWS_SHARED_CREDENTIALS_FILE. (#​30493)
    • shared_config_files and shared_credentials_files arguments for specifying credential and configuration files as part of the backend configuration. (#​30493)
    • Internally the backend now uses AWS SDK for Go v2, which should address various other missing behaviors that are handled by the SDK rather than by Terraform itself. (#​30443)
    • custom_ca_bundle argument and support for the corresponding AWS environment variable, AWS_CA_BUNDLE, for providing custom root and intermediate certificates. (#​33689)
    • ec2_metadata_service_endpoint and ec2_metadata_service_endpoint_mode arguments and support for the corresponding AWS environment variables, AWS_EC2_METADATA_SERVICE_ENDPOINT and AWS_EC2_METADATA_SERVICE_ENDPOINT_MODE for setting the EC2 metadata service (IMDS) endpoint. The environment variable AWS_METADATA_URL is also supported for compatibility with the AWS provider, but is deprecated. (#​30444)
    • http_proxy, insecure, use_fips_endpoint, and use_dualstack_endpoint arguments and support for the corresponding environment variables, HTTP_PROXY and HTTPS_PROXY, which enable custom HTTP proxy configurations and the resolution of AWS endpoints with extended capabilities. (#​30496)
    • sts_region argument to use an alternative region for STS operations. (#​33693)
    • retry_mode argument and support for the corresponding AWS_RETRY_MODE environment variable to configure how retries are attempted. (#​33692)
    • allowed_account_ids and forbidden_account_ids arguments to prevent unintended modifications to specified environments. (#​33688)
  • backend/cos: Support custom HTTP(S) endpoint and root domain for the API client. (#​33656)

BUG FIXES:

  • core: Transitive dependencies were lost during apply when the referenced resource expanded into zero instances. (#​33403)
  • cli: Terraform will no longer override SSH settings in local git configuration when installing modules. (#​33592)
  • terraform built-in provider: The upstream dependency that Terraform uses for service discovery of Terraform-native services such as Terraform Cloud/Enterprise state storage was previously not concurrency-safe, but Terraform was treating it as if it was in situations like when a configuration has multiple terraform_remote_state blocks all using the "remote" backend. Terraform is now using a newer version of that library which updates its internal caches in a concurrency-safe way. (#​33364)
  • terraform init: Terraform will no longer allow downloading remote modules to invalid paths. (#​33745)
  • Ignore potential remote terraform version mismatch when running force-unlock (#​28853)
  • cloud: Fixed a bug that would prevent nested symlinks from being dereferenced into the config sent to Terraform Cloud (#​31895)
  • cloud: state snapshots could not be disabled when header x-terraform-snapshot-interval is absent (#​33820)

Previous Releases

For information on prior major and minor releases, see their changelogs:

v1.5.7

Compare Source

1.5.7 (September 7, 2023)

BUG FIXES:

  • terraform init: Terraform will no longer allow downloading remote modules to invalid paths. (#​33745)
  • terraform_remote_state: prevent future possible incompatibility with states which include unknown check block result kinds. (#​33818)

v1.5.6

Compare Source

1.5.6 (August 23, 2023)

BUG FIXES:

  • terraform_remote_state: Fixed a potential unsafe read panic when reading from multiple terraform_remote_state data sources (#​33333)

v1.5.5

Compare Source

1.5.5 (August 9, 2023)

  • terraform init: Fix crash when using invalid configuration in backend blocks. (#​33628)

v1.5.4

Compare Source

1.5.4 (July 26, 2023)

BUG FIXES:

  • check blocks: Fixes crash when nested data sources are within configuration targeted by the terraform import command. (#​33578)
  • check blocks: Check blocks now operate in line with other checkable objects by also executing during import operations. (#​33578)

v1.5.3

Compare Source

1.5.3 (July 12, 2023)

BUG FIXES:

  • core: Terraform could fail to evaluate module outputs when they are used in a provider configuration during a destroy operation (#​33462)
  • backend/consul: When failing to save state, consul CAS failed with transaction errors no longer shows an error instance memory address, but an actual error message. (#​33108)
  • plan renderer: Fixes crash when rendering the plan if a relevant attribute contains an integer index specified as a string. (#​33475)

v1.5.2

Compare Source

1.5.2 (June 28, 2023)

BUG FIXES:

  • configs: Multiple import blocks with the same id string no longer result in a validation error (#​33434)

v1.5.1

Compare Source

1.5.1 (June 21, 2023)

BUG FIXES:

  • core: plan validation would fail for providers using nested set attributes with computed object attribute (#​33377)

v1.5.0

Compare Source

1.5.0 (June 12, 2023)

NEW FEATURES:

  • check blocks for validating infrastructure: Module and configuration authors can now write independent check blocks within their configuration to validate assertions about their infrastructure.

    The new independent check blocks must specify at least one assert block, but possibly many, each one with a condition expression and an error_message expression matching the existing Custom Condition Checks.
    Additionally, check blocks can optionally load a scoped data source. Scoped data sources match the existing data sources with the exception that they can only be referenced from within their check block.

    Unlike the existing precondition and postcondition blocks, Terraform will not halt execution should the scoped data block fail or error or if any of the assertions fail.
    This allows practitioners to continually validate the state of their infrastructure outside the usual lifecycle management cycle.

  • import blocks for importing infrastructure: Root module authors can now use the import block to declare their intent that Terraform adopt an existing resource.

    Import is now a configuration-driven, plannable action, and is processed as part of a normal plan. Running terraform plan will show a summary of the resources that Terraform has planned to import, along with any other plan changes.

    The existing terraform import CLI command has not been modified.

    This is an early version of the import block feature, for which we are actively seeking user feedback to shape future development. The import block currently does not support interpolation in the id field, which must be a string.

  • Generating configuration for imported resources: in conjunction with the import block, this feature enables easy templating of configuration when importing existing resources into Terraform. A new flag -generate-config-out=PATH is added to terraform plan. When this flag is set, Terraform will generate HCL configuration for any resource included in an import block that does not already have associated configuration, and write it to a new file at PATH. Before applying, review the generated configuration and edit it as necessary.

  • Adds a new plantimestamp function that returns the timestamp at plan time. This is similar to the timestamp function which returns the timestamp at apply time (#​32980).

  • Adds a new strcontains function that checks whether a given string contains a given substring. (#​33069)

UPGRADE NOTES:

  • This is the last version of Terraform for which macOS 10.13 High Sierra or 10.14 Mojave are officially supported. Future Terraform versions may not function correctly on these older versions of macOS.

  • This is the last version of Terraform for which Windows 7, 8, Server 2008, and Server 2012 are supported by Terraform's main implementation language, Go. We already ended explicit support for versions earlier than Windows 10 in Terraform v0.15.0, but future Terraform versions may malfunction in more significant ways on these older Windows versions.

  • On Linux (and some other non-macOS Unix platforms we don't officially support), Terraform will now notice the trust-ad option in /etc/resolv.conf and, if set, will set the "authentic data" option in outgoing DNS requests in order to better match the behavior of the GNU libc resolver.

    Terraform does not pay any attention to the corresponding option in responses, but some DNSSEC-aware recursive resolvers return different responses when the request option isn't set. This should therefore avoid some potential situations where a DNS request from Terraform might get a different response than a similar request from other software on your system.

ENHANCEMENTS:

  • Terraform CLI's local operations mode will now attempt to persist state snapshots to the state storage backend periodically during the apply step, thereby reducing the window for lost data if the Terraform process is aborted unexpectedly. (#​32680)
  • If Terraform CLI receives SIGINT (or its equivalent on non-Unix platforms) during the apply step then it will immediately try to persist the latest state snapshot to the state storage backend, with the assumption that a graceful shutdown request often typically followed by a hard abort some time later if the graceful shutdown doesn't complete fast enough. (#​32680)
  • pg backend: Now supports the PG_CONN_STR, PG_SCHEMA_NAME, PG_SKIP_SCHEMA_CREATION, PG_SKIP_TABLE_CREATION and PG_SKIP_INDEX_CREATION environment variables. (#​33045)

BUG FIXES:

  • terraform init: Fixed crash with invalid blank module name. (#​32781)
  • moved blocks: Fixed a typo in the error message that Terraform raises when you use -target to exclude an object that has been moved. (#​33149)

Previous Releases

For information on prior major and minor releases, see their changelogs:

v1.4.7

Compare Source

1.4.7 (September 13, 2023)

BUG FIXES:

  • terraform_remote_state: fix incompatibility with states produced by Terraform 1.5 or later which include check block results. (#​33814)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@ivankatliarchuk ivankatliarchuk added deps github-releases minor when you add functionality in a backwards compatible manner renovate labels Jun 16, 2023
@ivankatliarchuk ivankatliarchuk self-assigned this Jun 16, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from 4a9c0ad to f6719eb Compare June 25, 2023 04:25
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.5.0 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.5.1 (terraform/dockerfile) (master) Jun 25, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from f6719eb to 5a6539a Compare July 2, 2023 04:24
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.5.1 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.5.2 (terraform/dockerfile) (master) Jul 2, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from 5a6539a to b5c6502 Compare July 16, 2023 04:24
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.5.2 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.5.3 (terraform/dockerfile) (master) Jul 16, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from b5c6502 to d3a457b Compare July 30, 2023 04:21
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.5.3 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.5.4 (terraform/dockerfile) (master) Jul 30, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from d3a457b to 70e54af Compare August 13, 2023 04:21
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.5.4 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.5.5 (terraform/dockerfile) (master) Aug 13, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from 70e54af to cf87243 Compare August 17, 2023 04:21
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from cf87243 to ff90209 Compare August 27, 2023 04:21
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.5.5 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.5.6 (terraform/dockerfile) (master) Aug 27, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from ff90209 to c8381e9 Compare September 11, 2023 04:22
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.5.6 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.5.7 (terraform/dockerfile) (master) Sep 11, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from c8381e9 to fc9b532 Compare October 8, 2023 04:22
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.5.7 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.6.0 (terraform/dockerfile) (master) Oct 8, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from fc9b532 to a0d6059 Compare October 14, 2023 04:23
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.6.0 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.6.1 (terraform/dockerfile) (master) Oct 14, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from a0d6059 to 7e77721 Compare October 22, 2023 04:23
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.6.1 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.6.2 (terraform/dockerfile) (master) Oct 22, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch 2 times, most recently from 268ac69 to a77dee1 Compare November 5, 2023 04:23
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.6.2 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.6.3 (terraform/dockerfile) (master) Nov 5, 2023
@ivankatliarchuk ivankatliarchuk force-pushed the renovate/master-terraform-hashicorp-terraform-1.x branch from a77dee1 to ab0debc Compare November 19, 2023 04:24
@ivankatliarchuk ivankatliarchuk changed the title chore(deps): update dependency hashicorp/terraform to v1.6.3 (terraform/dockerfile) (master) chore(deps): update dependency hashicorp/terraform to v1.6.4 (terraform/dockerfile) (master) Nov 19, 2023
@ivankatliarchuk ivankatliarchuk merged commit 03857cd into master Nov 19, 2023
@ivankatliarchuk ivankatliarchuk deleted the renovate/master-terraform-hashicorp-terraform-1.x branch November 19, 2023 08:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
deps github-releases minor when you add functionality in a backwards compatible manner renovate
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant