Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.24.0
->0.24.1
~> 0.14.8
->~> 1.0.0
~> 2.0
->~> 3.0
Release Notes
cloudposse/terraform-null-label
v0.24.1
Compare Source
Allow control of letter case of outputs @SweetOps (#107)
You now have control over the letter case of generated tag names and supplied labels, which means you also have control over the letter case of the ultimate
id
.Labels are the elements you can include in
label_order
, namelynamespace
,environment
,stage
,name
, andattributes
. For every non-empty label, a corresponding tag name is generated. Fornamespace
,environment
,stage
, the output is the formatted, normalized input. (By "normalized" we mean that it goes throughregex_replace_chars
.), Forattributes
, which is a list, each element is normalized, duplicates are removed, and the resulting list is converted to a string by joining the elements with thedelimiter
(defaults to hyphen). Forname
, which is special, the output is the same asid
, which is the joining of the labels in the order specified bylabel_order
and separated bydelimiter
.label_key_case
to one ofupper
,lower
, ortitle
, which will result in generatedtag
names in the corresponding case:NAME
,name
, orName
. For backwards compatibility,title
is the defaultlabel_value_case
to one ofupper
,lower
,title
, ornone
, which will result in output label values in the corresponding case (withnone
meaning no case conversion of any kind will be done, though the labels will still be subject toregex_replace_chars
). The case converted labels will show up not just in the module output of the labels themselves, but also in thetag
values and in theid
string.You can look at the test cases in
examples/complete
and the expected results intest/src/examples_complete_test.go
to see examples of how this is supposed to work.One interesting example is that you can create
id
s in Pascal case by settinglabel_value_case = "title"
anddelimiter = ""
.Include updates to exports/context.tf @Nuru (#122 and #123)
##### what - Include updates to `exports/context.tf` - Update README with features and compatibilty - Add validation for `id_length_limit` ##### why - The `exports/context.tf` is what gets distributed and needs to be in sync - Replace outdated information - Was not validated earlier because validators are not supported in TF 0.12 but now we are dropping support for TF 0.12 and so we can add validatorsRestore backward compatibility with v0.22.1 and earlier @Nuru (#121)
##### what - Restore backward compatibility with v0.22.1 and earlier - Allow setting of `label_key_case` and `label_value_case` by vars, not just by context attributes. ##### why - Allow interoperability of old and new modules - Normally, root modules make settings via individual variables, not by setting an entire context block.Incorporates and closes #120
hashicorp/terraform
v1.0.4
Compare Source
1.0.4 (August 04, 2021)
BUG FIXES:
v1.0.3
Compare Source
1.0.3 (July 21, 2021)
ENHANCEMENTS
terraform plan
: The JSON logs (-json
option) will now includeresource_drift
, showing changes detected outside of Terraform during the refresh step. (#29072)max_request_bytes
allows larger requests and for the client, to match the server request limit. (#28078)BUG FIXES:
terraform plan
: Will no longer panic when trying to render null maps. (#29207)v1.0.2
Compare Source
1.0.2 (July 07, 2021)
BUG FIXES:
terraform show
: Fix crash when rendering JSON plan with sensitive values in state (#29049)floor
andceil
functions no longer lower the precision of arguments to what would fit inside a 64-bit float, instead preserving precision in a similar way as most other arithmetic functions. (#29110)flatten
function was incorrectly treating null values of an unknown type as if they were unknown values. Now it will treat them the same as any other non-list/non-tuple value, flattening them down into the result as-is. (#29110)v1.0.1
Compare Source
1.0.1 (June 24, 2021)
ENHANCEMENTS:
BUG FIXES:
setproduct
with unknown values (#28984)v1.0.0
Compare Source
1.0.0 (June 08, 2021)
Terraform v1.0 is an unusual release in that its primary focus is on stability, and it represents the culmination of several years of work in previous major releases to make sure that the Terraform language and internal architecture will be a suitable foundation for forthcoming additions that will remain backward compatible.
Terraform v1.0.0 intentionally has no significant changes compared to Terraform v0.15.5. You can consider the v1.0 series as a direct continuation of the v0.15 series; we do not intend to issue any further releases in the v0.15 series, because all of the v1.0 releases will be only minor updates to address bugs.
For all future minor releases with major version 1, we intend to preserve backward compatibility as described in detail in the Terraform v1.0 Compatibility Promises. The later Terraform v1.1.0 will, therefore, be the first minor release with new features that we will implement with consideration of those promises.
v0.15.5
Compare Source
0.15.5 (June 02, 2021)
BUG FIXES:
terraform plan
andterraform apply
: Don't show "Objects have changed" notification when the detected changes are only internal details related to legacy SDK quirks. (#28796)v0.15.4
Compare Source
0.15.4 (May 19, 2021)
NEW FEATURES:
Noting changes made outside of Terraform: Terraform has always, by default, made a point during the planning operation of reading the current state of remote objects in order to detect any changes made outside of Terraform, to make sure the plan will take those into account.
Terraform will now report those detected changes as part of the plan result, in order to give additional context about the planned changes. We've often heard that people find it confusing when a plan includes a change that doesn't seem to be prompted by any recent change in the configuration, and so this feature is aiming to provide the previously-missing explanation for situations where Terraform is planning to undo a change.
It can also be useful just as general information when the change won't be undone by Terraform: if you've intentionally made a change outside of Terraform and mirrored that change in your configuration then Terraform will now confirm that it noticed the change you made and took it into account when planning.
By default this new output is for information only and doesn't change any behavior. If Terraform detects a change you were expecting then you don't need to take any additional action to respond to it. However, we've also added a new planning mode
-refresh-only
which allows you to explicitly plan and apply the action of writing those detected changes to the Terraform state, which serves as a plannable replacement forterraform refresh
. We don't have any plans to remove the long-standingterraform refresh
command, but we do recommend usingterraform apply -refresh-only
instead in most cases, because it will provide an opportunity to review what Terraform detected before updating the Terraform state.UPGRADE NOTES:
resource.
,template.
,arg.
, andlazy.
. We don't expect these additions to cause problems for most existing configurations, but could cause a conflict if you are using a custom provider which has a resource type named exactly "resource", "template", "arg", or "lazy". In that unlikely event, you can escape references to resources of those types by adding aresource.
prefix; for example, if you have aresource "template" "foo"
then you can change references to it fromtemplate.foo
toresource.template.foo
in order to escape the new meaning.ENHANCEMENTS:
filesha256
, will now stream the contents of the given file into the hash function in smaller chunks. Previously they would always read the entire file into memory before hashing it, due to following a similar implementation strategy as thefile
function. (#28681)terraform init
: add a new-migrate-state
flag instead of automatic state migration, to prevent failing when old backend config is not usable (#28718)terraform plan
andterraform apply
: will now report any changes Terraform detects during the "refresh" phase for each managed object, providing confirmation that Terraform has seen those changes and, where appropriate, extra context to help understand the planned change actions that follow. (#28634)terraform plan
andterraform apply
: now have a new option-refresh-only
to activate the "refresh only" planning mode, which causes Terraform to ignore any changes suggested by the configuration but still detect any changes made outside of Terraform since the latestterraform apply
. (#28634)GOOGLE_APPLICATION_CREDENTIALS
environment variable. This is also available in the Google Provider in versions newer than v3.61. (#28296)-refresh=false
,-replace
, and-refresh-only
. (#28746)BUG FIXES:
bastion_port
in a resourceconnection
block (#28665)create_before_destroy
replacement failed to destroy the old object, in which case Terraform needs to track both the new and old objects until the old object is successfully deleted. Refreshing these during planning means that you can, if you wish, delete a "deposed" object manually outside of Terraform and then have Terraform detect that you've done so. (#28634)lookup
andlength
functions, which were accidentally omitted from the larger update in 0.15.1 (#28509)v0.15.3
Compare Source
0.15.3 (May 06, 2021)
ENHANCEMENTS:
terraform show
: Add data to the JSON plan output describing which changes caused a resource to be replaced (#28608)BUG FIXES:
terraform show
: Fix crash for JSON plan output of new resources with sensitive attributes in nested blocks (#28624)v0.15.2
Compare Source
0.15.2 (May 05, 2021)
ENHANCEMENTS:
terraform plan
andterraform apply
: Both now support a new planning option-replace=...
which takes the address of a resource instance already tracked in the state and forces Terraform to upgrade either an update or no-op plan for that instance into a "replace" (either destroy-then-create or create-then-destroy depending on configuration), to allow replacing a degraded object with a new object of the same configuration in a single action and preview the effect of that before applying it.terraform apply
: Now has a-destroy
option for symmetry withterraform plan -destroy
, which makesterraform destroy
effectively an alias forterraform apply -destroy
. This change is only for consistency betweenterraform plan
andterraform apply
; there are no current plans to deprecateterraform destroy
. (#28489)BUG FIXES:
setproduct
with one or more empty collections (#28607)v0.15.1
Compare Source
0.15.1 (April 26, 2021)
ENHANCEMENTS:
config: Various Terraform language functions now have more precise inference rules for propagating the "sensitive" characteristic values.
The affected functions are
chunklist
,concat
,flatten
,keys
,length
,lookup
,merge
,setproduct
,tolist
,tomap
,values
, andzipmap
. The details are a little different for each of these but the general idea is to, as far as possible, preserve the sensitive characteristic on individual element or attribute values in result structures rather than always conservatively applying sensitivity to the whole result.The primary benefit of these improvements is that you can now use these functions as part of constructing maps for
for_each
in situations where the input collection is never sensitive but some of the elements/attributes inside might be. (#28446] [#28460)cli: Update the HashiCorp public key (#28505)
cli: Diagnostic messages can now be annotated with resource and provider addresses. (#28275)
cli:
terraform login
now has a new user experience for successful log-ins to Terraform Cloud and Terraform Enterprise. (#28487)core: Minor graph performance optimizations. (#28329)
BUG FIXES:
sensitive
attribute for sensitive values remains, with an extended diagnostic message to explain why. (#28472)v0.15.0
Compare Source
0.15.0 (April 14, 2021)
UPGRADE NOTES AND BREAKING CHANGES:
The following is a summary of each of the changes in this release that might require special consideration when upgrading. Refer to the Terraform v0.15 upgrade guide for more details and recommended upgrade steps.
"Proxy configuration blocks" (provider blocks with only
alias
set) in shared modules are now replaced with a more explicitconfiguration_aliases
argument within therequired_providers
block. Some support for the old syntax is retained for backward compatibility, but we've added explicit error messages for situations where Terraform would previously silently misinterpret the purpose of an emptyprovider
block. (#27739)The
list
andmap
functions, both of which were deprecated since Terraform v0.12, are now removed. You can replace uses of these functions withtolist([...])
andtomap({...})
respectively. (#26818)Terraform now requires UTF-8 character encoding and virtual terminal support when running on Windows. This unifies Terraform's terminal handling on Windows with that of other platforms, as per Microsoft recommendations. Terraform previously required these terminal features on all other platforms, and now requires them on Windows too.
UTF-8 and virtual terminal support were introduced across various Windows 10 updates, and so Terraform is no longer officially supported on the original release of Windows 10 or on Windows 8 and earlier. However, there are currently no technical measures to artificially prevent Terraform from running on these obsolete Windows releases, and so you may still be able to use Terraform v0.15 on older Windows versions if you either disable formatting (using the
-no-color
) option, or if you use a third-party terminal emulator package such as ConEmu, Cmder, or mintty.We strongly encourage planning to migrate to a newer version of Windows rather than relying on these workarounds for the long term, because the Terraform team will test future releases only on up-to-date Windows 10 and can therefore not guarantee ongoing support for older versions.
Built-in vendor provisioners (chef, habitat, puppet, and salt-masterless) have been removed. (#26938)
Interrupting execution will now cause terraform to exit with a non-zero exit status. (#26738)
The trailing
[DIR]
argument to specify the working directory for various commands is no longer supported. Use the global-chdir
option instead. (#27664)For example, instead of
terraform init infra
, writeterraform -chdir=infra init
.The
-lock
and-lock-timeout
options are no longer available onterraform init
(#27464)The
-verify-plugins=false
option is no longer available onterraform init
. (Terraform now always verifies plugins.) (#27461)The
-get-plugins=false
option is no longer available onterraform init
. (Terraform now always installs plugins.) (#27463)The
-force
option is no longer available onterraform destroy
. Use-auto-approve
instead (#27681)The
-var
and-var-file
options are no longer available onterraform validate
. These were deprecated and have had no effect since Terraform v0.12. (#27906)terraform version -json
output no longer includes the (previously-unpopulated) "revision" property (#27484)In the
gcs
backend thepath
config argument, which was deprecated since Terraform v0.11, is now removed. Use theprefix
argument instead. (#26841)The deprecated
ignore_changes = ["*"]
wildcard syntax is no longer supported. Useignore_changes = all
instead. (#27834)Previously deprecated quoted variable type constraints are no longer supported. Follow the instructions in the error message to update your type signatures to be more explicit. For example, use
map(string)
instead of"map"
. (#27852)Terraform will no longer make use of the
HTTP_PROXY
environment variable to determine proxy settings for connecting to HTTPS servers. You must always setHTTPS_PROXY
if you intend to use a proxy to connect to an HTTPS server. (Note: This affects only connections made directly from Terraform CLI. Terraform providers are separate programs that make their own requests and may thus have different proxy configuration behaviors.)Provider-defined sensitive attributes will now be redacted throughout the plan output. You may now see values redacted as
(sensitive)
that were previously visible, because sensitivity did not follow provider-defined sensitive attributes.If you are transforming a value and wish to force it not to be sensitive, such as if you are transforming a value in such a way that removes the sensitive data, we recommend using the new
nonsensitive
function to hint Terraform that the result is not sensitive.The
atlas
backend, which was deprecated since Terraform v0.12, is now removed. (#26651)We've upgraded the underlying TLS and certificate-related libraries that Terraform uses when making HTTPS requests to remote systems. This includes the usual tweaks to preferences for different cryptographic algorithms during handshakes and also some slightly-stricter checking of certificate syntax. These changes should not cause problems for correctly-implemented HTTPS servers, but can sometimes cause unexpected behavior changes with servers or middleboxes that don't comply fully with the relevant specifications.
ENHANCEMENTS:
required_providers
entry can now containconfiguration_aliases
to declare additional configuration aliases names without requirring a configuration block (#27739)one
for concisely converting a zero-or-one element list/set into a single value that might benull
. (#27454)sensitive
andnonsensitive
allow module authors to explicitly override Terraform's default infererence of value sensitivity for situations where it's too conservative or not conservative enough. (#27341)backend
block in a non-root module. Terraform has always ignored such declarations, but previously did so silently. This is a warning rather than an error only because it is sometimes convenient to temporarily use a root module as if it were a child module in order to test or debug its behavior separately from its main backend. (#26954)terraform fmt
now automatically fixes most cases that the warning would previously highlight. We still recommend using simpler expressions where possible, but the deprecation warning had caused a common confusion in the community that the interpolation syntax is always deprecated, rather than only in the interpolation-only case. (#27835)terraform init
: Will now make suggestions for possible providers on some registry failures, and generally remind ofrequired_providers
on all registry failures. (#28014)terraform init
: Provider installation will now only attempt to rewrite.terraform.lock.hcl
if it would contain new information. (#28230)terraform init
: New-lockfile=readonly
option, which suppresses writing changes to the dependency lock file. Any installed provider packages must already be recorded in the lock file, or initialization will fail. Use this if you are managing the lock file via a separate process and want to avoid adding new checksums for existing dependencies. (#27630)terraform show
: Improved performance when rendering large plans as JSON. (#27998)terraform validate
: The JSON output now includes a code snippet object for each diagnostic. If present, this object contains an excerpt of the source code which triggered the diagnostic, similar to what Terraform would include in human-oriented diagnostic messages. (#28057)terraform destory
instead ofdestroy
, will now print out a specific error message about the command being invalid, rather than just printing out the usual help directory. (#26967)TF_LOG_CORE
andTF_LOG_PROVIDER
(#26685)BUG FIXES:
defaults
function. (#27979, #28067)terraform validate
: Validation now ignores providers that lack configuration, which is useful for validating modules intended to be called from other modules which therefore don't include their own provider configurations. (#24896)terraform fmt
: Fixfmt
output when unwrapping redundant multi-line string interpolations (#28202)terraform console
: expressions usingpath
(path.root
,path.module
) now return the same result as they would in a configuration (#27263)terraform show
: Fix crash when rendering JSON plans containing iterable unknown values. (#28253)terraform show
: fix issue withchild_modules
not properly displaying in certain circumstances. (#27352)terraform state list
: fix bug where nested modules' resources were missing (#27268)terraform state mv
: fix display names in errors and improve error when failing to target a whole resource (#27482)terraform taint
: show resource name in -allow-missing warning (#27501)terraform untaint
: show resource name in -allow-missing warning (#27502)-input=false
. Previously Terraform would behave as if the user entered an empty string, which often led to confusing results. (#26509)TF_LOG
levels other thantrace
will now work reliably. (#26632)-refresh=false
. (#28272)terraform show saved.tfplan
matchesterraform plan
, and sensitive values are elided. (#28201)create_before_destroy
ordering is preserved. (#28228)EXPERIMENTS:
provider_sensitive_attrs
: This experiment has now concluded, and its functionality is now on by default. If you were previously participating in this experiment then you can remove the experiment opt-in with no other necessary configuration changes.terraform test
command, which is currently an experimental feature serving as part of the Module Testing Experiment.hashicorp/terraform-provider-random
v3.1.0
Compare Source
Binary releases of this provider now include the darwin-arm64 platform. This version contains no further changes.
v3.0.1
Compare Source
BUG FIXES:
resource_integer
: Integers in state that do not cleanly fit into float64s no longer lose their precision (#132)v3.0.0
Compare Source
Binary releases of this provider will now include the linux-arm64 platform.
BREAKING CHANGES:
b64
attribute (#118)Configuration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR has been generated by Renovate Bot.