Update hashicorp/terraform Docker tag to v0.14.8 #83
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.13.5->0.14.8Release Notes
hashicorp/terraform
v0.14.8Compare Source
BUG FIXES:
ENHANCEMENTS:
v0.14.7Compare Source
0.14.7 (February 17, 2021)
ENHANCEMENTS:
target_platformas"windows"in theconnectionblock. (#26865)BUG FIXES:
show -jsonnot outputting the full module tree when some child modules have no resources (#27352)required_providersinstead of provider config (#27697)v0.14.6Compare Source
0.14.6 (February 04, 2021)
ENHANCEMENTS:
BUG FIXES:
initwill reuse installed providers rather than fetching the provider again (#27582)v0.14.5Compare Source
0.14.5 (January 20, 2021)
ENHANCEMENTS:
BUG FIXES:
v0.14.4Compare Source
0.14.4 (January 06, 2021)
UPGRADE NOTES:
BUG FIXES:
sensitivevalues as arguments to data sources ([#27335])sensitivevalues ascountarguments on validate ([#27410])sensitivevalues to module input variables which have custom variable validation ([#27412])sensitivevalues ([#27420])v0.14.3Compare Source
0.14.3 (December 17, 2020)
ENHANCEMENTS:
terraform output: Now supports a new "raw" mode, activated by the-rawoption, for printing out the raw string representation of a particular output value. (#27212)Only primitive-typed values have a string representation, so this formatting mode is not compatible with complex types. The
-jsonmode is still available as a general way to get a machine-readable representation of an output value of any type.config:
for_eachnow allows maps whose element values are sensitive, as long as the element keys and the map itself are not sensitive. (#27247)BUG FIXES:
anytrueandalltruefunctions when called with values which are not known until apply. (#27240)sumfunction when called with values which are not known until apply. Also allowssumto cope with numbers too large to represent in float64, along with correctly handling errors around infinite values. (#27249)countexpressions (#27238)sensitivevalues with expressions and functions.coalescelistwith anullargument (#26988)terraform apply:-refresh=falsewas skipped when running apply directly (#27233)terraform init: setting-get-pluginstofalsewill now cause a warning, as this flag has been a no-op since 0.13.0 and usage is better served through usingprovider_installationblocks (#27092)terraform initand other commands which interact with the dependency lock file: These will now generate a normal error message if the lock file is incorrectly a directory, rather than crashing as before. (#27250)v0.14.2Compare Source
0.14.2 (December 08, 2020)
BUG FIXES:
terraform_remote_statedata source. This check is unnecessary, because the data source is read-only by definition. (#27197)v0.14.1Compare Source
0.14.1 (December 08, 2020)
ENHANCEMENTS:
-ignore-remote-version. (#26947)BUG FIXES:
ignore_changesappears to not work, or causes validation errors with some resources. (#27141)terraform fmt: Fix incorrect formatting with attribute expressions enclosed in parentheses. (#27040)v0.14.0Compare Source
0.14.0 (December 02, 2020)
NEW FEATURES:
Terraform now supports marking input variables as sensitive, and will propagate that sensitivity through expressions that derive from sensitive input variables.
terraform initwill now generate a lock file in the configuration directory which you can check in to your version control so that Terraform can make the same version selections in future. (#26524)If you wish to retain the previous behavior of always taking the newest version allowed by the version constraints on each install, you can run
terraform init -upgradeto see that behavior.Terraform will now support reading and writing all compatible state files, even from future versions of Terraform. This means that users of Terraform 0.14.0 will be able to share state files with future Terraform versions until a new state file format version is needed. We have no plans to change the state file format at this time. (#26752)
UPGRADE NOTES:
sensitive, or attributes a provider defines assensitiveif theprovider_sensitive_attrsexperiment is activated) must also be defined as sensitive, or Terraform will error at plan.versionargument inside provider configuration blocks has been documented as deprecated since Terraform 0.12. As of 0.14 it will now also generate an explicit deprecation warning. To avoid the warning, use provider requirements declarations instead. (#26135)Transfer-Encoding: identity. (#26357)terraform 0.13upgradesubcommand and the associated upgrade mechanisms are no longer available. Complete the v0.13 upgrade process before upgrading to Terraform v0.14.debugcommand, which did not offer additional functionality, has been removed.ENHANCEMENTS:
sensitiveargument for variable blocks, which supresses output where that variable is used (#26183)alltrueandanytruefunctions, which serve as a sort of dynamic version of the&&and||or operators, respectively. These are intended to allow evaluating boolean conditions, such as in variablevalidationblocks, across all of the items in a collection usingforexpressions. (#25656], [#26498)textencodebase64andtextdecodebase64for encoding text in various character encodings other than UTF-8. (#25470)terraform planandterraform apply: Added an experimental concise diff renderer. By default, Terraform plans now hide most unchanged fields, only displaying the most relevant changes and some identifying context. This experiment can be disabled by setting aTF_X_CONCISE_DIFFenvironment variable to0. (#26187)ignore_changescan now apply to map keys that are not listed in the configuration (#26421)terraform console: Now has distinct rendering of lists, sets, and tuples, and correctly renders objects withnullattribute values. Multi-line strings are rendered using the "heredoc" syntax. (#26189, #27054)terraform login: Added support for OAuth2 application scopes. (#26239)terraform fmt: Will now do some slightly more opinionated normalization behaviors, using the documented idiomatic syntax. (#26390)terraform init's provider installation step will now abort promptly if Terraform receives an interrupt signal. (#26405)-chdir=..., placed before the selected subcommand, instructs Terraform to switch to a different working directory before executing the subcommand. This is similar to switching to a new directory withcdbefore running Terraform, but it avoids changing the state of the calling shell. (#26087)terraform init. (#26761)terraform planno longer uses a separate refresh phase. Instead, all resources are updated on-demand during planning (#26270)SSL_CERT_DIRenvironment variable can now be a colon-separated list of multiple certificate search paths. (#26357)Security.frameworkAPI to access the system trust roots, for improved consistency with other MacOS software. (#26357)BUG FIXES:
required_providersobject. (#26184)element()is called with a negative offset (#26079)lookup()will now only treat map as unknown if it is wholly unknown (#26427)terraform fmt: Fix incorrect heredoc syntax in plan diff output (#25725)terraform show: Hide sensitive outputs from display (#26740)terraform taint: If the configuration'srequired_versionconstraint is not met, thetaintsubcommand will now correctly exit early. (#26345)terraform taintandterraform untaint: Fix issue when usingtaint(anduntaint) with workspaces where statefile was not found. (#22467)terraform init: Fix locksfile constraint output for versions like "1.2". (#26637)terraform init: Omit duplicate version constraints when installing packages or writing locksfile. (#26678)state push -forceto work for all backends (#26190)/(#25842)EXPERIMENTS:
Experiments are Terraform language features that are not yet finalized but that we've included in a release so you can potentially try them out and share feedback. These features are only available if you explicitly enable the relevant experiment for your module. To share feedback on active experiments, please open an enhancement request issue in the main Terraform repository.
module_variable_optional_attrs: When declaring an input variable for a module whose type constraint (typeargument) contains an object type constraint, the type expressions for the attributes can be annotated with the experimentaloptional(...)modifier.Marking an attribute as "optional" changes the type conversion behavior for that type constraint so that if the given value is a map or object that has no attribute of that name then Terraform will silently give that attribute the value
null, rather than returning an error saying that it is required. The resulting value still conforms to the type constraint in that the attribute is considered to be present, but references to it in the recieving module will find a null value and can act on that accordingly.This experiment also includes a function named
defaultswhich you can use in a local value to replace the null values representing optional attributes with non-null default values. The function also requires that you enable themodule_variable_optional_attrsexperiment for any module which calls it.provider_sensitive_attrs: This is an unusual experiment in that it doesn't directly allow you to use a new feature in your module configuration but instead it changes the automatic behavior of Terraform in modules where it's enabled.For modules where this experiment is active, Terraform will consider the attribute sensitivity flags set in provider resource type schemas when propagating the "sensitive" flag through expressions in the configuration. This is experimental because it has the potential to make far more items in the output be marked as sensitive than before, and so we want to get some experience and feedback about it before hopefully making this the default behavior.
One important consequence of enabling this experiment is that you may need to mark more of your module's output values as
sensitive = true, in any case where a particular output value is derived from a value a provider has indicated as being sensitive. Without that explicit annotation, Terraform will return an error to avoid implicitly exposing a sensitive value via an output value.If you try either of these features during their experimental periods and have feedback about them, please open a feature request issue. We are aiming to stabilize both features in the forthcoming v0.15 release, but their design may change in the meantime based on feedback. If we make further changes to the features during the v0.15 period then they will be reflected in v0.15 alpha releases.
v0.13.6Compare Source
0.13.6 (January 06, 2021)
UPGRADE NOTES:
terraform_remote_statedata source no longer enforces Terraform version checks on the remote state file. This allows Terraform 0.13.6 to access remote state from future Terraform versions, up until a future incompatible state file version upgrade is required. (#26692)BUG FIXES:
-get-pluginstofalsewill now cause a warning, as this flag has been a no-op since 0.13.0 and usage is better served through usingprovider_installationblocks (#27092)Renovate configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Enabled.
♻️ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.