chore(deps): update hashicorp/terraform docker tag to v1.6.4 (terragrunt/dockerfile) (master) #753
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.4.6->1.6.4Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
hashicorp/terraform (hashicorp/terraform)
v1.6.4Compare Source
1.6.4 (November 15, 2023)
ENHANCEMENTS:
endpoints.ssoto allow overriding the AWS SSO API endpoint. (#34195)BUG FIXES:
terraform test: Fix bug preventing passing sensitive output values from previous run blocks as inputs to future run blocks. (#34190)https_proxyandno_proxyparameters to allow fully specifying proxy configuration (#34243)v1.6.3Compare Source
1.6.3 (November 1, 2023)
ENHANCEMENTS:
skip_s3_checksumto allow users to disable checksum on S3 uploads for compatibility with "S3-compatible" APIs. (#34127)v1.6.2Compare Source
1.6.2 (October 18, 2023)
BUG FIXES
terraform test: Fix performance issues when using provisioners within configs being tested. (#34026)terraform test: Only process and parse relevant variables for each run block. (#34072)-reconfigureduring eachinitwhen config was not decoded correctly (#34108)v1.6.1Compare Source
1.6.1 (October 10, 2023)
ENHANCEMENTS:
skip_requesting_account_idargument supports AWS API implementations that do not have the IAM, STS, or metadata API. (#34002)BUG FIXES:
GIT_SSH_COMMANDis now preserved again when fetching modules from git source addresses. [GH-34045]TF_WORKSPACEenvironment variable works with thecloudblock again; it can specify a workspace when none is configured, or select an active workspace when the config specifiestags. [GH-34012]kms_key_idargument will no longer fail validation. (#33993)v1.6.0Compare Source
1.6.0 (October 4, 2023)
UPGRADE NOTES:
hashicorp/awsprovider:assume_role. The top-level argumentsrole_arn,session_name,external_id,assume_role_duration_seconds,assume_role_policy_arns,assume_role_tags, andassume_role_transitive_tag_keysare all now deprecated in favor of the nested equivalents. (#30495)endpoints. The top-level argumentsdynamodb_endpoint,iam_endpoint,endpoint(fir S3), andsts_endpointare now deprecated in favor of the nested equivalents. (#30492)AWS_ENDPOINT_URL_DYNAMODB,AWS_ENDPOINT_URL_IAM,AWS_ENDPOINT_URL_S3, andAWS_ENDPOINT_URL_STS. The old non-standard names for these environment variables are now deprecated:AWS_DYNAMODB_ENDPOINT,AWS_IAM_ENDPOINT,AWS_S3_ENDPOINT, andAWS_STS_ENDPOINT. (#30479)shared_credentials_fileargument is deprecated in favor of the pluralshared_credentials_files.force_path_styleargument is deprecated in favor ofuse_path_stylefor consistency with the AWS SDK. (#30491)NEW FEATURES:
terraform test: Theterraform testcommand is now generally available. This comes with a significant change to how tests are written and executed, based on feedback from the experimental phase.Terraform tests are written in
.tftest.hclfiles, containing a series ofrunblocks. Eachrunblock executes a Terraform plan and optional apply against the Terraform configuration under test and can check conditions against the resulting plan and state.ENHANCEMENTS:
config: The
importblockidfield now accepts expressions referring to other values such as resource attributes, as long as the value is a string known at plan time. (#33618)Terraform Cloud integration: Remote plans on Terraform Cloud/Enterprise can now be saved using the
-outoption, viewed usingterraform show, and applied usingterraform applywith the saved plan filename. (#33492)config: Terraform can now track some additional detail about values that won't be known until the apply step, such as the range of possible lengths for a collection or whether an unknown value can possibly be null.
core: Provider schemas can now be cached globally for compatible providers, allowing them to be reused throughout core without requesting them for each new provider instance. This can significantly reduce memory usage when there are many instances of the same provider in a single configuration (#33482)
When this information is available, Terraform can potentially generate known results for some operations on unknown values. This doesn't mean that Terraform can immediately track that detail in all cases, but the type system now supports that and so over time we can improve the level of detail generated by built-in functions, language operators, Terraform providers, etc. (#33234)
config: The
tryandcanfunctions can now return more precise and consistent results when faced with unknown arguments (#33758)terraform show -json: Now includeserroredproperty, indicating whether the planning process halted with an error. An errored plan is not applyable. (#33372)core: Terraform will now skip requesting the (possibly very large) provider schema from providers which indicate during handshake that they don't require that for correct behavior, in situations where Terraform Core itself does not need the schema. (#33486)
backend/kubernetes: The Kubernetes backend is no longer limited to storing states below 1MiB in size, and can now scale by splitting state across multiple secrets. (#29678)
backend/s3: Various improvements for consistency with
hashicorp/awsprovider capabilities:assume_role_with_web_identitynested block for assuming a role with dynamic credentials such as a JSON Web Token. (#31244)AWS_CONFIG_FILEandAWS_SHARED_CREDENTIALS_FILE. (#30493)shared_config_filesandshared_credentials_filesarguments for specifying credential and configuration files as part of the backend configuration. (#30493)custom_ca_bundleargument and support for the corresponding AWS environment variable,AWS_CA_BUNDLE, for providing custom root and intermediate certificates. (#33689)ec2_metadata_service_endpointandec2_metadata_service_endpoint_modearguments and support for the corresponding AWS environment variables,AWS_EC2_METADATA_SERVICE_ENDPOINTandAWS_EC2_METADATA_SERVICE_ENDPOINT_MODEfor setting the EC2 metadata service (IMDS) endpoint. The environment variableAWS_METADATA_URLis also supported for compatibility with the AWS provider, but is deprecated. (#30444)http_proxy,insecure,use_fips_endpoint, anduse_dualstack_endpointarguments and support for the corresponding environment variables,HTTP_PROXYandHTTPS_PROXY, which enable custom HTTP proxy configurations and the resolution of AWS endpoints with extended capabilities. (#30496)sts_regionargument to use an alternative region for STS operations. (#33693)retry_modeargument and support for the correspondingAWS_RETRY_MODEenvironment variable to configure how retries are attempted. (#33692)allowed_account_idsandforbidden_account_idsarguments to prevent unintended modifications to specified environments. (#33688)backend/cos: Support custom HTTP(S) endpoint and root domain for the API client. (#33656)
BUG FIXES:
terraformbuilt-in provider: The upstream dependency that Terraform uses for service discovery of Terraform-native services such as Terraform Cloud/Enterprise state storage was previously not concurrency-safe, but Terraform was treating it as if it was in situations like when a configuration has multipleterraform_remote_stateblocks all using the "remote" backend. Terraform is now using a newer version of that library which updates its internal caches in a concurrency-safe way. (#33364)terraform init: Terraform will no longer allow downloading remote modules to invalid paths. (#33745)Previous Releases
For information on prior major and minor releases, see their changelogs:
v1.5.7Compare Source
1.5.7 (September 7, 2023)
BUG FIXES:
terraform init: Terraform will no longer allow downloading remote modules to invalid paths. (#33745)terraform_remote_state: prevent future possible incompatibility with states which include unknowncheckblock result kinds. (#33818)v1.5.6Compare Source
1.5.6 (August 23, 2023)
BUG FIXES:
v1.5.5Compare Source
1.5.5 (August 9, 2023)
terraform init: Fix crash when using invalid configuration in backend blocks. (#33628)v1.5.4Compare Source
1.5.4 (July 26, 2023)
BUG FIXES:
checkblocks: Fixes crash when nested data sources are within configuration targeted by the terraform import command. (#33578)checkblocks: Check blocks now operate in line with other checkable objects by also executing during import operations. (#33578)v1.5.3Compare Source
1.5.3 (July 12, 2023)
BUG FIXES:
consul CAS failed with transaction errorsno longer shows an error instance memory address, but an actual error message. (#33108)v1.5.2Compare Source
1.5.2 (June 28, 2023)
BUG FIXES:
importblocks with the sameidstring no longer result in a validation error (#33434)v1.5.1Compare Source
1.5.1 (June 21, 2023)
BUG FIXES:
v1.5.0Compare Source
1.5.0 (June 12, 2023)
NEW FEATURES:
checkblocks for validating infrastructure: Module and configuration authors can now write independent check blocks within their configuration to validate assertions about their infrastructure.The new independent
checkblocks must specify at least oneassertblock, but possibly many, each one with aconditionexpression and anerror_messageexpression matching the existing Custom Condition Checks.Additionally, check blocks can optionally load a scoped data source. Scoped data sources match the existing data sources with the exception that they can only be referenced from within their check block.
Unlike the existing
preconditionandpostconditionblocks, Terraform will not halt execution should the scoped data block fail or error or if any of the assertions fail.This allows practitioners to continually validate the state of their infrastructure outside the usual lifecycle management cycle.
importblocks for importing infrastructure: Root module authors can now use theimportblock to declare their intent that Terraform adopt an existing resource.Import is now a configuration-driven, plannable action, and is processed as part of a normal plan. Running
terraform planwill show a summary of the resources that Terraform has planned to import, along with any other plan changes.The existing
terraform importCLI command has not been modified.This is an early version of the
importblock feature, for which we are actively seeking user feedback to shape future development. Theimportblock currently does not support interpolation in theidfield, which must be a string.Generating configuration for imported resources: in conjunction with the
importblock, this feature enables easy templating of configuration when importing existing resources into Terraform. A new flag-generate-config-out=PATHis added toterraform plan. When this flag is set, Terraform will generate HCL configuration for any resource included in animportblock that does not already have associated configuration, and write it to a new file atPATH. Before applying, review the generated configuration and edit it as necessary.Adds a new
plantimestampfunction that returns the timestamp at plan time. This is similar to thetimestampfunction which returns the timestamp at apply time (#32980).Adds a new
strcontainsfunction that checks whether a given string contains a given substring. (#33069)UPGRADE NOTES:
This is the last version of Terraform for which macOS 10.13 High Sierra or 10.14 Mojave are officially supported. Future Terraform versions may not function correctly on these older versions of macOS.
This is the last version of Terraform for which Windows 7, 8, Server 2008, and Server 2012 are supported by Terraform's main implementation language, Go. We already ended explicit support for versions earlier than Windows 10 in Terraform v0.15.0, but future Terraform versions may malfunction in more significant ways on these older Windows versions.
On Linux (and some other non-macOS Unix platforms we don't officially support), Terraform will now notice the
trust-adoption in/etc/resolv.confand, if set, will set the "authentic data" option in outgoing DNS requests in order to better match the behavior of the GNU libc resolver.Terraform does not pay any attention to the corresponding option in responses, but some DNSSEC-aware recursive resolvers return different responses when the request option isn't set. This should therefore avoid some potential situations where a DNS request from Terraform might get a different response than a similar request from other software on your system.
ENHANCEMENTS:
pgbackend: Now supports thePG_CONN_STR,PG_SCHEMA_NAME,PG_SKIP_SCHEMA_CREATION,PG_SKIP_TABLE_CREATIONandPG_SKIP_INDEX_CREATIONenvironment variables. (#33045)BUG FIXES:
terraform init: Fixed crash with invalid blank module name. (#32781)movedblocks: Fixed a typo in the error message that Terraform raises when you use-targetto exclude an object that has been moved. (#33149)Previous Releases
For information on prior major and minor releases, see their changelogs:
v1.4.7Compare Source
1.4.7 (September 13, 2023)
BUG FIXES:
terraform_remote_state: fix incompatibility with states produced by Terraform 1.5 or later which includecheckblock results. (#33814)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.