Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.24.0
->0.24.1
0.28.18
->0.31.3
0.14.8
->0.15.5
Release Notes
cloudposse/terraform-null-label
v0.24.1
Compare Source
Allow control of letter case of outputs @SweetOps (#107)
You now have control over the letter case of generated tag names and supplied labels, which means you also have control over the letter case of the ultimate
id
.Labels are the elements you can include in
label_order
, namelynamespace
,environment
,stage
,name
, andattributes
. For every non-empty label, a corresponding tag name is generated. Fornamespace
,environment
,stage
, the output is the formatted, normalized input. (By "normalized" we mean that it goes throughregex_replace_chars
.), Forattributes
, which is a list, each element is normalized, duplicates are removed, and the resulting list is converted to a string by joining the elements with thedelimiter
(defaults to hyphen). Forname
, which is special, the output is the same asid
, which is the joining of the labels in the order specified bylabel_order
and separated bydelimiter
.label_key_case
to one ofupper
,lower
, ortitle
, which will result in generatedtag
names in the corresponding case:NAME
,name
, orName
. For backwards compatibility,title
is the defaultlabel_value_case
to one ofupper
,lower
,title
, ornone
, which will result in output label values in the corresponding case (withnone
meaning no case conversion of any kind will be done, though the labels will still be subject toregex_replace_chars
). The case converted labels will show up not just in the module output of the labels themselves, but also in thetag
values and in theid
string.You can look at the test cases in
examples/complete
and the expected results intest/src/examples_complete_test.go
to see examples of how this is supposed to work.One interesting example is that you can create
id
s in Pascal case by settinglabel_value_case = "title"
anddelimiter = ""
.Include updates to exports/context.tf @Nuru (#122 and #123)
#### what - Include updates to `exports/context.tf` - Update README with features and compatibilty - Add validation for `id_length_limit` #### why - The `exports/context.tf` is what gets distributed and needs to be in sync - Replace outdated information - Was not validated earlier because validators are not supported in TF 0.12 but now we are dropping support for TF 0.12 and so we can add validatorsRestore backward compatibility with v0.22.1 and earlier @Nuru (#121)
#### what - Restore backward compatibility with v0.22.1 and earlier - Allow setting of `label_key_case` and `label_value_case` by vars, not just by context attributes. #### why - Allow interoperability of old and new modules - Normally, root modules make settings via individual variables, not by setting an entire context block.Incorporates and closes #120
gruntwork-io/terragrunt
v0.31.3
Compare Source
Updated CLI args, config attributes and blocks
include
[block]Description
deep
merge strategy forinclude
. Refer to the updated documentation for more information on what deep merge means.Related links
v0.31.2
Compare Source
Updated CLI args, config attributes and blocks
include
[block]Description
include
:merge_strategy
.merge_strategy
indicates how the included parent config should be merged with the child config. Currently, this only supportsno_merge
andshallow
. When omitted, the merge strategy defaults toshallow
(the same strategy as previous versions).Related links
v0.31.1
Compare Source
Updated CLI args, config attributes and blocks
Description
terraform
. Nowterragrunt
will check all the args and determine if an arg is a plan file (a filename that exists on disk and ends with extensiontfplan
), and if it is, feed it to the end of the args list.Special thanks
Related links
v0.31.0
Compare Source
Description
Related links
gruntwork-io/terragrunt#1726
v0.30.7
Compare Source
Updated CLI args, config attributes and blocks
include
[block]Description
Fix bug where using an exposed
include
withlocal
in the same expression did not work when referencing inlocals
blocks.Related links
gruntwork-io/terragrunt#1727
gruntwork-io/terragrunt#1728
v0.30.6
Compare Source
Updated CLI args, config attributes and blocks
remote_state
[block]Description
remote_state
block handles the AWS partition settings so that it works correctly with GovCloud.Special thanks
Related links
v0.30.5
Compare Source
Updated CLI args, config attributes and blocks
include
[block]Description
Fix bug where exposing
include
did not work when referencing inlocals
blocks.Related links
gruntwork-io/terragrunt#1721
gruntwork-io/terragrunt#1723
v0.30.4
Compare Source
Updated CLI args, config attributes and blocks
include
[block]Description
You can now access values from included config. E.g., if you want to access a local var
region
defined in the parent terragrunt config, you can referenceinclude.locals.region
in the child config.Note that there are a few limitations/differences with
read_terragrunt_config
:include
references do not include fetched dependencies. This will change in the future.include
references are not automatically available. You must set the newexpose
attribute totrue
to access the included references.include
block in the child, and you can onlyinclude
one level deep (no nestedinclude
s). This will change in the future.(This is the first of several features that implement the Imports RFC)
Related links
gruntwork-io/terragrunt#1566
gruntwork-io/terragrunt#1716
v0.30.3
Compare Source
Updated CLI args, config attributes and blocks
run-all
[command]Description
Improved error messaging when multiple errors are returned.
Special thanks
Special thanks to @derom for their contribution!
Related links
gruntwork-io/terragrunt#1703
v0.30.2
Compare Source
Updated CLI args, config attributes and blocks
aws-provider-patch
(command)Description
Improve error messages in
aws-provider-patch
when the json input is malformed.Related links
gruntwork-io/terragrunt#1715
v0.30.1
Compare Source
Updated CLI args, config attributes and blocks
hclfmt
(command)Description
Updated documentation and help text in
hclfmt
command to clarify that it works on all files withhcl
extension, not justterragrunt.hcl
.Special thanks
Special thanks to @edgarsandi for their contribution!
Related links
gruntwork-io/terragrunt#1713
v0.30.0
Compare Source
Updated CLI args, config attributes and blocks
aws-provider-patch
(command)Description
aws-provider-patch
now supports additional data types. Previouslyaws-provider-patch
only supported patching strings, which made it impossible to patch provider attributes that are not strings (e.g., theallowed_account_ids
attribute of theaws
provider, which islist(string)
type).Note that to support this, the
aws-provider-patch
now expects attribute values to be json encoded when passed in. That means that you need to quote the values in order for it to work. For example, if you previously ran:you need to update the call to:
Related links
gruntwork-io/terragrunt#1714
gruntwork-io/terragrunt#1709
v0.29.10
Compare Source
Updated CLI args, config attributes and blocks
yamldecode
(helper function)Description
Fix bug where
yamldecode
is unable decode certain forms of yaml.Special thanks
Special thanks to @andreykaipov for the contribution!
Related links
gruntwork-io/terragrunt#1706
v0.29.9
Compare Source
Updated CLI args, config attributes and blocks
--terragrunt-include-external-dependencies
Description
You can now configure the
--terragrunt-include-external-dependencies
setting via the environment variableTERRAGRUNT_INCLUDE_EXTERNAL_DEPENDENCIES
.Special thanks
Special thanks to @elebertus for the contribution!
Related links
gruntwork-io/terragrunt#1548
v0.29.8
Compare Source
Updated CLI args, config attributes and blocks
--terragrunt-debug
Description
You can now control the
--terragrunt-debug
flag using theTERRAGRUNT_DEBUG
environment variable.Related links
gruntwork-io/terragrunt#1698
v0.29.7
Compare Source
Updated CLI args, config attributes and blocks
iam_role
Description
Fix a bug where Terragrunt would not properly assume the IAM role specified via the
iam_role
parameter if you were using AWS SSO.Special thanks
Thank you to @stevie- for the contribution!
Related links
v0.29.6
Compare Source
Updated CLI args, config attributes and blocks
--help
Description
Update the usage text for Terragrunt to reflect that options should go after the command. There should be no impact on Terragrunt's behavior in this release.
Special thanks
Thank you to @Tarasovych for the contribution!
Related links
v0.29.5
Compare Source
Updated CLI args, config attributes and blocks
--terragrunt-source-map
[CLI Arg]Description
You can now configure the Terragrunt source map option using the environment variable
TERRAGRUNT_SOURCE_MAP
. You can configure multiple mappings using comma separated value encoding. For example, the following configures three mappings:Related links
v0.29.4
Compare Source
Updated CLI args, config attributes and blocks
--terragrunt-iam-assume-role-duration
[new CLI Arg]iam_assume_role_duration
[new config]Description
You can now use the new CLI arg and config setting to configure the duration for the IAM role from
--terragrunt-iam-role
.Special thanks
Thank you to @thehunt33r for the contribution!
Related links
v0.29.3
Compare Source
Updated CLI args, config attributes and blocks
--terragrunt-source-map
[CLI Arg]Description
This release introduces
--terragrunt-source-map
, which can be used to provide multiple mappings to translate terragrunt source URLs in the config with another path. See the documentation for more information.Related links
v0.29.2
Compare Source
Updated CLI args, config attributes and blocks
get_aws_account_id
[func]get_aws_caller_identity_arn
[func]get_aws_caller_identity_user_id
[func]Description
get_aws_**
functions ignored the config file (~/.aws/config
).Related links
v0.29.1
Compare Source
Updated CLI args, config attributes and blocks
Description
Related links
v0.29.0
Compare Source
Updated CLI args, config attributes and blocks
Description
Related links
v0.28.24
Compare Source
Updated CLI args, config attributes and blocks
skip_bucket_versioning
Description
skip_bucket_versioning
is set totrue
, and you are using GCS as a backend, Terragrunt will not only not enable versioning automatically, but now it will also no longer try to check if versioning is enabled either.Special thanks
Related links
v0.28.23
Compare Source
Updated CLI args, config attributes and blocks
get_terraform_commands_that_need_locking()
Description
init
from the list of commands returned byget_terraform_commands_that_need_locking()
, asinit
does not support locking, and as of Terraform 0.15, will exit with an error if you try to use the lock parameters with it.Special thanks
Related links
init
from TERRAFORM_COMMANDS_NEED_LOCKING gruntwork-io/terragrunt#1642v0.28.22
Compare Source
Updated CLI args, config attributes and blocks
sops_decrypt_file()
Description
sops
,aws-sdk-go
, andvault
libraries that we depend on. As a result, thesops_decrypt_file()
function should now work with data encrypted via HashiCorp Vault.Special thanks
Related links
v0.28.21
Compare Source
Updated CLI args, config attributes and blocks
get_original_terragrunt_dir()
[NEW]generate
remote_state
Description
get_original_terragrunt_dir()
helper, which returns the directory where the original Terragrunt configuration file (by defaultterragrunt.hcl
) lives. This is primarily useful when one Terragrunt config is being read from another: e.g., if/terraform-code/terragrunt.hcl
callsread_terragrunt_config("/foo/bar.hcl")
, and withinbar.hcl
, you callget_original_terragrunt_dir()
, you'll get back/terraform-code
.generate
andremote_state
settings so that they can be set either as blocks or attributes. This makes it possible to, for example, read these settings fromcommon.hcl
usingread_terragrunt_config
and set them dynamically.Related links
v0.28.20
Compare Source
Updated CLI args, config attributes and blocks
--terragrunt-strict-include
Description
--terragrunt-strict-include
, Terragrunt will now only execute within the directories passed in via--terragrunt-include-dir
. If you set--terragrunt-strict-include
, but don't pass in any directories via--terragrunt-include-dir
, then Terragrunt will exit without doing anything. This is arguably a backwards incompatible change, but this is the behavior the--terragrunt-strict-include
flag was intended to have originally, and is less surprising, so we're treating this as a bug fix.Special thanks
Related links
--terragrunt-strict-include
when no--terragrunt-include-dir
flags are included gruntwork-io/terragrunt#1631v0.28.19
Compare Source
Updated CLI args, config attributes and blocks
retry_max_attempts
[NEW]retry_sleep_interval_sec
[NEW]Description
retry_max_attempts
andretry_sleep_interval_sec
, respectively.debug
.Special thanks
Related links
hashicorp/terraform
v0.15.5
Compare Source
0.15.5 (June 02, 2021)
BUG FIXES:
terraform plan
andterraform apply
: Don't show "Objects have changed" notification when the detected changes are only internal details related to legacy SDK quirks. (#28796)v0.15.4
Compare Source
0.15.4 (May 19, 2021)
NEW FEATURES:
Noting changes made outside of Terraform: Terraform has always, by default, made a point during the planning operation of reading the current state of remote objects in order to detect any changes made outside of Terraform, to make sure the plan will take those into account.
Terraform will now report those detected changes as part of the plan result, in order to give additional context about the planned changes. We've often heard that people find it confusing when a plan includes a change that doesn't seem to be prompted by any recent change in the configuration, and so this feature is aiming to provide the previously-missing explanation for situations where Terraform is planning to undo a change.
It can also be useful just as general information when the change won't be undone by Terraform: if you've intentionally made a change outside of Terraform and mirrored that change in your configuration then Terraform will now confirm that it noticed the change you made and took it into account when planning.
By default this new output is for information only and doesn't change any behavior. If Terraform detects a change you were expecting then you don't need to take any additional action to respond to it. However, we've also added a new planning mode
-refresh-only
which allows you to explicitly plan and apply the action of writing those detected changes to the Terraform state, which serves as a plannable replacement forterraform refresh
. We don't have any plans to remove the long-standingterraform refresh
command, but we do recommend usingterraform apply -refresh-only
instead in most cases, because it will provide an opportunity to review what Terraform detected before updating the Terraform state.UPGRADE NOTES:
resource.
,template.
,arg.
, andlazy.
. We don't expect these additions to cause problems for most existing configurations, but could cause a conflict if you are using a custom provider which has a resource type named exactly "resource", "template", "arg", or "lazy". In that unlikely event, you can escape references to resources of those types by adding aresource.
prefix; for example, if you have aresource "template" "foo"
then you can change references to it fromtemplate.foo
toresource.template.foo
in order to escape the new meaning.ENHANCEMENTS:
filesha256
, will now stream the contents of the given file into the hash function in smaller chunks. Previously they would always read the entire file into memory before hashing it, due to following a similar implementation strategy as thefile
function. (#28681)terraform init
: add a new-migrate-state
flag instead of automatic state migration, to prevent failing when old backend config is not usable (#28718)terraform plan
andterraform apply
: will now report any changes Terraform detects during the "refresh" phase for each managed object, providing confirmation that Terraform has seen those changes and, where appropriate, extra context to help understand the planned change actions that follow. (#28634)terraform plan
andterraform apply
: now have a new option-refresh-only
to activate the "refresh only" planning mode, which causes Terraform to ignore any changes suggested by the configuration but still detect any changes made outside of Terraform since the latestterraform apply
. (#28634)GOOGLE_APPLICATION_CREDENTIALS
environment variable. This is also available in the Google Provider in versions newer than v3.61. (#28296)-refresh=false
,-replace
, and-refresh-only
. (#28746)BUG FIXES:
bastion_port
in a resourceconnection
block (#28665)create_before_destroy
replacement failed to destroy the old object, in which case Terraform needs to track both the new and old objects until the old object is successfully deleted. Refreshing these during planning means that you can, if you wish, delete a "deposed" object manually outside of Terraform and then have Terraform detect that you've done so. (#28634)lookup
andlength
functions, which were accidentally omitted from the larger update in 0.15.1 (#28509)v0.15.3
Compare Source
0.15.3 (May 06, 2021)
ENHANCEMENTS:
terraform show
: Add data to the JSON plan output describing which changes caused a resource to be replaced (#28608)BUG FIXES:
terraform show
: Fix crash for JSON plan output of new resources with sensitive attributes in nested blocks (#28624)v0.15.2
Compare Source
0.15.2 (May 05, 2021)
ENHANCEMENTS:
terraform plan
andterraform apply
: Both now support a new planning option-replace=...
which takes the address of a resource instance already tracked in the state and forces Terraform to upgrade either an update or no-op plan for that instance into a "replace" (either destroy-then-create or create-then-destroy depending on configuration), to allow replacing a degraded object with a new object of the same configuration in a single action and preview the effect of that before applying it.terraform apply
: Now has a-destroy
option for symmetry withterraform plan -destroy
, which makesterraform destroy
effectively an alias forterraform apply -destroy
. This change is only for consistency betweenterraform plan
andterraform apply
; there are no current plans to deprecateterraform destroy
. (#28489)BUG FIXES:
setproduct
with one or more empty collections (#28607)v0.15.1
Compare Source
0.15.1 (April 26, 2021)
ENHANCEMENTS:
config: Various Terraform language functions now have more precise inference rules for propagating the "sensitive" characteristic values.
The affected functions are
chunklist
,concat
,flatten
,keys
,length
,lookup
,merge
,setproduct
,tolist
,tomap
,values
, andzipmap
. The details are a little different for each of these but the general idea is to, as far as possible, preserve the sensitive characteristic on individual element or attribute values in result structures rather than always conservatively applying sensitivity to the whole result.The primary benefit of these improvements is that you can now use these functions as part of constructing maps for
for_each
in situations where the input collection is never sensitive but some of the elements/attributes inside might be. (#28446] [#28460)cli: Update the HashiCorp public key (#28505)
cli: Diagnostic messages can now be annotated with resource and provider addresses. (#28275)
cli:
terraform login
now has a new user experience for successful log-ins to Terraform Cloud and Terraform Enterprise. (#28487)core: Minor graph performance optimizations. (#28329)
BUG FIXES:
sensitive
attribute for sensitive values remains, with an extended diagnostic message to explain why. (#28472)v0.15.0
Compare Source
0.15.0 (April 14, 2021)
UPGRADE NOTES AND BREAKING CHANGES:
The following is a summary of each of the changes in this release that might require special consideration when upgrading. Refer to the Terraform v0.15 upgrade guide for more details and recommended upgrade steps.
"Proxy configuration blocks" (provider blocks with only
alias
set) in shared modules are now replaced with a more explicitconfiguration_aliases
argument within therequired_providers
block. Some support for the old syntax is retained for backward compatibility, but we've added explicit error messages for situations where Terraform would previously silently misinterpret the purpose of an emptyprovider
block. (#27739)The
list
andmap
functions, both of which were deprecated since Terraform v0.12, are now removed. You can replace uses of these functions withtolist([...])
andtomap({...})
respectively. (#26818)Terraform now requires UTF-8 character encoding and virtual terminal support when running on Windows. This unifies Terraform's terminal handling on Windows with that of other platforms, as per Microsoft recommendations. Terraform previously required these terminal features on all other platforms, and now requires them on Windows too.
UTF-8 and virtual terminal support were introduced across various Windows 10 updates, and so Terraform is no longer officially supported on the original release of Windows 10 or on Windows 8 and earlier. However, there are currently no technical measures to artificially prevent Terraform from running on these obsolete Windows releases, and so you may still be able to use Terraform v0.15 on older Windows versions if you either disable formatting (using the
-no-color
) option, or if you use a third-party terminal emulator package such as ConEmu, Cmder, or mintty.We strongly encourage planning to migrate to a newer version of Windows rather than relying on these workarounds for the long term, because the Terraform team will test future releases only on up-to-date Windows 10 and can therefore not guarantee ongoing support for older versions.
Built-in vendor provisioners (chef, habitat, puppet, and salt-masterless) have been removed. (#26938)
Interrupting execution will now cause terraform to exit with a non-zero exit status. (#26738)
The trailing
[DIR]
argument to specify the working directory for various commands is no longer supported. Use the global-chdir
option instead. (#27664)For example, instead of
terraform init infra
, writeterraform -chdir=infra init
.The
-lock
and-lock-timeout
options are no longer available onterraform init
(#27464)The
-verify-plugins=false
option is no longer available onterraform init
. (Terraform now always verifies plugins.) (#27461)The
-get-plugins=false
option is no longer available onterraform init
. (Terraform now always installs plugins.) (#27463)The
-force
option is no longer available onterraform destroy
. Use-auto-approve
instead (#27681)The
-var
and-var-file
options are no longer available onterraform validate
. These were deprecated and have had no effect since Terraform v0.12. (#27906)terraform version -json
output no longer includes the (previously-unpopulated) "revision" property (#27484)In the
gcs
backend thepath
config argument, which was deprecated since Terraform v0.11, is now removed. Use theprefix
argument instead. (#26841)The deprecated
ignore_changes = ["*"]
wildcard syntax is no longer supported. Useignore_changes = all
instead. (#27834)Previously deprecated quoted variable type constraints are no longer supported. Follow the instructions in the error message to update your type signatures to be more explicit. For example, use
map(string)
instead of"map"
. (#27852)Terraform will no longer make use of the
HTTP_PROXY
environment variable to determine proxy settings for connecting to HTTPS servers. You must always setHTTPS_PROXY
if you intend to use a proxy to connect to an HTTPS server. (Note: This affects only connections made directly from Terraform CLI. Terraform providers are separate programs that make their own requests and may thus have different proxy configuration behaviors.)Provider-defined sensitive attributes will now be redacted throughout the plan output. You may now see values redacted as
(sensitive)
that were previously visible, because sensitivity did not follow provider-defined sensitive attributes.If you are transforming a value and wish to force it not to be sensitive, such as if you are transforming a value in such a way that removes the sensitive data, we recommend using the new
nonsensitive
function to hint Terraform that the result is not sensitive.The
atlas
backend, which was deprecated since Terraform v0.12, is now removed. (#26651)We've upgraded the underlying TLS and certificate-related libraries that Terraform uses when making HTTPS requests to remote systems. This includes the usual tweaks to preferences for different cryptographic algorithms during handshakes and also some slightly-stricter checking of certificate syntax. These changes should not cause problems for correctly-implemented HTTPS servers, but can sometimes cause unexpected behavior changes with servers or middleboxes that don't comply fully with the relevant specifications.
ENHANCEMENTS:
required_providers
entry can now containconfiguration_aliases
to declare additional configuration aliases names without requirring a configuration block (#27739)one
for concisely converting a zero-or-one element list/set into a single value that might benull
. (#27454)sensitive
andnonsensitive
allow module authors to explicitly override Terraform's default infererence of value sensitivity for situations where it's too conservative or not conservative enough. (#27341)backend
block in a non-root module. Terraform has always ignored such declarations, but previously did so silently. This is a warning rather than an error only because it is sometimes convenient to temporarily use a root module as if it were a child module in order to test or debug its behavior separately from its main backend. (#26954)terraform fmt
now automatically fixes most cases that the warning would previously highlight. We still recommend using simpler expressions where possible, but the deprecation warning had caused a common confusion in the community that the interpolation syntax is always deprecated, rather than only in the interpolation-only case. (#27835)terraform init
: Will now make suggestions for possible providers on some registry failures, and generally remind ofrequired_providers
on all registry failures. (#28014)terraform init
: Provider installation will now only attempt to rewrite.terraform.lock.hcl
if it would contain new information. (#28230)terraform init
: New-lockfile=readonly
option, which suppresses writing changes to the dependency lock file. Any installed provider packages must already be recorded in the lock file, or initialization will fail. Use this if you are managing the lock file via a separate process and want to avoid adding new checksums for existing dependencies. (#27630)terraform show
: Improved performance when rendering large plans as JSON. (#27998)terraform validate
: The JSON output now includes a code snippet object for each diagnostic. If present, this object contains an excerpt of the source code which triggered the diagnostic, similar to what Terraform would include in human-oriented diagnostic messages. (#28057)terraform destory
instead ofdestroy
, will now print out a specific error message about the command being invalid, rather than just printing out the usual help directory. (#26967)TF_LOG_CORE
andTF_LOG_PROVIDER
(#26685)BUG FIXES:
defaults
function. (#27979, #28067)terraform validate
: Validation now ignores providers that lack configuration, which is useful for validating modules intended to be called from other modules which therefore don't include their own provider configurations. (#24896)terraform fmt
: Fixfmt
output when unwrapping redundant multi-line string interpolations (#28202)terraform console
: expressions usingpath
(path.root
,path.module
) now return the same result as they would in a configuration (#27263)terraform show
: Fix crash when rendering JSON plans containing iterable unknown values. (#28253)terraform show
: fix issue withchild_modules
not properly displaying in certain circumstances. (#27352)terraform state list
: fix bug where nested modules' resources were missing (#27268)terraform state mv
: fix display names in errors and improve error when failing to target a whole resource (#27482)terraform taint
: show resource name in -allow-missing warning (#27501)terraform untaint
: show resource name in -allow-missing warning (#27502)-input=false
. Previously Terraform would behave as if the user entered an empty string, which often led to confusing results. (#26509)TF_LOG
levels other thantrace
will now work reliably. (#26632)-refresh=false
. (#28272)terraform show saved.tfplan
matchesterraform plan
, and sensitive values are elided. (#28201)create_before_destroy
ordering is preserved. (#28228)EXPERIMENTS:
provider_sensitive_attrs
: This experiment has now concluded, and its functionality is now on by default. If you were previously participating in this experiment then you can remove the experiment opt-in with no other necessary configuration changes.terraform test
command, which is currently an experimental feature serving as part of the Module Testing Experiment.v0.14.11
Compare Source
0.14.11 (April 26, 2021)
ENHANCEMENTS:
v0.14.10
Compare Source
0.14.10 (April 07, 2021)
BUG FIXES:
v0.14.9
Compare Source
0.14.9 (March 24, 2021)
BUG FIXES:
Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.