chore(deps): update terraform minor and patch dependencies#17
Open
renovate-a-roo[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update terraform minor and patch dependencies#17renovate-a-roo[bot] wants to merge 1 commit intomainfrom
renovate-a-roo[bot] wants to merge 1 commit intomainfrom
Conversation
30cd796 to
efff2c6
Compare
efff2c6 to
9e6768d
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Pinning Terraform dependencies prevents unexpected changes being inherited from the common terraform-modules repo.
The common terraform-modules will be updated separately in a weekly PR.
This PR contains the following updates:
6.33.0->6.34.02.13.0->2.17.02.29.0->2.38.0Release Notes
hashicorp/terraform-provider-aws (aws)
v6.34.0Compare Source
FEATURES:
aws_ec2_secondary_network(#46552)aws_ec2_secondary_subnet(#46552)aws_ecr_task_definition(#46628)aws_elb(#46639)aws_s3_bucket_lifecycle_configuration(#46531)aws_networkmanager_prefix_list_association(#46566)ENHANCEMENTS:
kms_key_idattribute (#46584)network_typeandip_discoveryattributes (#46636)configuration.query_results_s3_access_grants_configurationargument (#46376)metadata_configurationblock for HTTP header and query parameter propagation (#45808)auth_parameters.connectivity_parametersargument (#41561)service_connect_configuration.access_log_configurationargument (#45820)kms_key_idargument (#46584)cpu_options.core_count,cpu_options.nested_virtualization, andcpu_options.threads_per_coreto be updated in-place (#46568)network_typeandip_discoveryarguments (#46636)jwt_optionsattribute (#46439)managed_rule_group_configswithinmanaged_rule_groupand root-levelvisibility_configblock for CloudWatch metrics configuration (#44426)BUG FIXES:
mongodb_settings.use_update_lookupattribute to fix "invalid address to set" error (#46616)statement.principals.identifierscontains a non-string value (#46226)couldn't find resource (21 retries)errors updatingload_balancers,target_group_arns, andtraffic_source(#46622)credential_provider_configuration.oauth.default_return_urlandcredential_provider_configuration.oauth.grant_typearguments (#46127)data_filter_expression.dimensions.values(#46462)encryption_configurationto Optional and Computed, fixingunexpected new value: .encryption_configuration: was null, but now cty.ObjectVal(map[string]cty.Value{"kms_key_arn":cty.NullVal(cty.String),"sse_algorithm":cty.StringVal("AES256")})errors (#46150)InvalidParameter: DnsOptions PrivateDnsOnlyForInboundResolverEndpoint is applicable only to Interface VPC Endpointserrors when creating S3Tables VPC endpoints (#46102)hashicorp/terraform-provider-helm (helm)
v2.17.0Compare Source
ENHANCEMENT:
resource/helm_release: the dry-run option is now set toserverto execute any chart lookups against the server during the plan stage. [GH-1335]BUG FIXES:
resource/helm_release: fix an issue wherepostrender.argsis not parsed correctly. [GH-1534]v2.16.1Compare Source
BUG FIXES:
helm_release: Fix nil pointer deref panic on destroy when helm release is not found [GH-1501]v2.16.0Compare Source
BUG FIXES:
helm_release: On destroy, do not error when release is not found [GH-1487]resource/helm_release: Fix: only recompute metadata when the version in the metadata changes [GH-1458]v2.15.0Compare Source
ENHANCEMENT:
upgrade_installboolean attribute to enable idempotent release installation, addressing components of GH-425 [GH-1247]v2.14.1Compare Source
DEPENDENCIES:
v2.14.0Compare Source
ENHANCEMENT:
helm_release: add new attributes metadata.last_deployed, metadata.first_deployed, metadata.notes [GH-1380]v2.13.2Compare Source
DEPENDENCIES:
v2.13.1Compare Source
HOTFIX:
helm_release: Fix regression causing errors at plan time.hashicorp/terraform-provider-kubernetes (kubernetes)
v2.38.0Compare Source
ENHANCEMENTS:
sub_path_exprto volume mount options pod spec [GH-2622]BUG FIXES:
data_source/kubernetes_pod_v1: fix an issue when the provider cuts out toleration under pod spec(spec.toleration) if it uses a well-known taint. [GH-2380]data_source/kubernetes_pod: fix an issue when the provider cuts out toleration under pod spec(spec.toleration) if it uses a well-known taint. [GH-2380]resource/kubernetes_cron_job: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_cron_job_v1: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_daemon_set_v1: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_daemonset: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_deployment: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_deployment_v1: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_job: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_job_v1: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_replication_controller_v1: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_replication_controller: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_stateful_set: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]resource/kubernetes_stateful_set_v1: fix an issue when the provider cuts out toleration under pod spec template(*.template.spec.toleration`) if it uses a well-known taint. That could lead to a perpetual diff behavior. [GH-2380]NOTES:
kubernetes_deployment_v1,kubernetes_stateful_set_v1, etc, and now the provider will keep all tolerations(spec.toleration) returned by Kubernetes. The same is applicable for the data sourceskubernetes_pod_v1andkubernetes_pod. The behavior of resourceskubernetes_pod_v1andkubernetes_podremains unchanged, i.e. the provider will keep removing tolerations with well-known taints since they might be attached to the object by Kubernetes controller and could lead to a perpetual diff. [GH-2380]v2.37.1Compare Source
BUG FIXES:
GetResourceIdentitySchemasimplementation. [GH-2732]v2.37.0Compare Source
ENHANCEMENTS:
kubernetes_config_map_v1: Add support for ResourceIdentity [GH-2721]v2.36.0Compare Source
ENHANCEMENTS:
resource/kubernetes_secret_v1: Add support for write only attributes fordata_woandbinary_data_wo. [GH-2692]v2.35.1Compare Source
BUG FIXES:
resource/kubernetes_job_v1: revert the changes introduced in v2.34.0, wherettl_seconds_after_finishedwas set to0. [GH-2650]resource/kubernetes_daemon_set_v1: fix issue where fieldsspec.strategy.rolling_update.max_surgeandspec.strategy.rolling_update.max_unavailablewere not being validated correctly. [GH-2653]v2.35.0Compare Source
FEATURES:
resources_kubernetes_daemon_set_v1: Addedmax_surgeargument for torolling_updateblock. [GH-2630]v2.34.0Compare Source
ENHANCEMENTS:
conditionsattribute tokubernetes_nodesdata source, which will provide detailed node health and status information [GH-2612]kubernetes_secret_v1_dataresource to the kubernetes provider. This resource will allow users to manage kubernetes secrets [GH-2604]FEATURES:
kubernetes_certificate_signing_request_v1[GH-2628]kubernetes_token_request_v1[GH-2628]v2.33.0Compare Source
ENHANCEMENTS:
backoff_per_limit_indexandmax_failed_indexesfields instructure_job.go[GH-2421]namespace_selectorfield inPodAffinityTermto enhance pod affinity and anti-affinity rules, allowing selection of namespaces based on label selectors. [GH-2577]kubernetes_manifest- handling "404 Not Found" errors during the deletion of Kubernetes resources, particularly in cases where the resource may have already been deleted by an operator managing the CRD before Terraform attempts to delete it. [GH-2592]schema_container.go: Add VolumeDevices [GH-2573]v2.32.0Compare Source
FEATURES:
kubernetes_server_version[GH-2306]ENHANCEMENTS:
resource/kubernetes_certificate_signing_request_v1: Add argumentspec.expiration_seconds[GH-2559]resource/kubernetes_persistent_volume_v1: supportReadWriteOncePodaccess mode for PVs [GH-2488]v2.31.0Compare Source
ENHANCEMENTS:
v2.30.0Compare Source
BUG FIXES:
data_source/kubernetes_resources: fix an issue where the provider exit with an error when the data sourcekubernetes_resourcesreceives multiple Kubernetes objects containing tuples with different numbers of elements. [GH-2372]kubernetes_manifest: fix issue preventing KUBE_PROXY_URL environment variable from being used in client configuration (#1733) [GH-2485]resource/kubernetes_node_taint: Fix the error check for nonexistant nodes so that terraform does not fail if there is a taint in the state file for a node that has been deleted. [GH-2402]DOCS:
Configuration
📅 Schedule: Branch creation - At 12:00 AM through 04:59 AM and 10:00 PM through 11:59 PM, Monday through Friday ( * 0-4,22-23 * * 1-5 ), Only on Sunday and Saturday ( * * * * 0,6 ) in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.