chore(deps): update dependency hashicorp/terraform to v1 #273
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.12.25
->1.1.2
Release Notes
hashicorp/terraform
v1.1.2
Compare Source
1.1.2 (December 17, 2021)
If you are using Terraform CLI v1.1.0 or v1.1.1, please upgrade to this new version as soon as possible.
Terraform CLI v1.1.0 and v1.1.1 both have a bug where a failure to construct the apply-time graph can cause Terraform to incorrectly report success and save an empty state, effectively "forgetting" all existing infrastructure. Although configurations that already worked on previous releases should not encounter this problem, it's possible that incorrect future configuration changes would trigger this behavior during the apply step.
BUG FIXES:
-target
in combination withmoved
blocks within modules (#30189)v1.1.1
Compare Source
1.1.1 (December 15, 2021)
BUG FIXES:
count
orfor_each
value (#30151)count
orfor_each
(#30171)v1.1.0
Compare Source
1.1.0 (December 08, 2021)
Terraform v1.1.0 is a new minor release, containing some new features and some bug fixes whose scope was too large for inclusion in a patch release.
NEW FEATURES:
moved
blocks for refactoring within modules: Module authors can now record in module source code whenever they've changed the address of a resource or resource instance, and then during planning Terraform will automatically migrate existing objects in the state to new addresses.This therefore avoids the need for users of a shared module to manually run
terraform state mv
after upgrading to a version of the module, as long as the change is expressible as static configuration. However,terraform state mv
will remain available for use in more complex migration situations that are not well-suited to declarative configuration.A new
cloud
block in theterraform
settings block introduces a native Terraform Cloud integration for the CLI-driven run workflow.The Cloud integration includes several enhancements, including per-run variable support using the
-var
flag, the ability to map Terraform Cloud workspaces to the current configuration via Workspace Tags, and an improved user experience for Terraform Cloud and Enterprise users with actionable error messages and prompts.terraform plan
andterraform apply
both now include additional annotations for resource instances planned for deletion to explain why Terraform has proposed that action.For example, if you change the
count
argument for a resource to a lower number then Terraform will now mention that as part of proposing to destroy any existing objects that exceed the new count.UPGRADE NOTES:
This release is covered by the Terraform v1.0 Compatibility Promises, but does include some changes permitted within those promises as described below.
Terraform on macOS now requires macOS 10.13 High Sierra or later; Older macOS versions are no longer supported.
The
terraform graph
command no longer supports-type=validate
and-type=eval
options. The validate graph is always the same as the plan graph anyway, and the "eval" graph was just an implementation detail of theterraform console
command. The default behavior of creating a plan graph should be a reasonable replacement for both of the removed graph modes. (Please note thatterraform graph
is not covered by the Terraform v1.0 compatibility promises, because its behavior inherently exposes Terraform Core implementation details, so we recommend it only for interactive debugging tasks and not for use in automation.)terraform apply
with a previously-saved plan file will now verify that the provider plugin packages used to create the plan fully match the ones used during apply, using the same checksum scheme that Terraform normally uses for the dependency lock file. Previously Terraform was checking consistency of plugins from a plan file using a legacy mechanism which covered only the main plugin executable, not any other files that might be distributed alongside in the plugin package.This additional check should not affect typical plugins that conform to the expectation that a plugin package's contents are immutable once released, but may affect a hypothetical in-house plugin that intentionally modifies extra files in its package directory somehow between plan and apply. If you have such a plugin, you'll need to change its approach to store those files in some other location separate from the package directory. This is a minor compatibility break motivated by increasing the assurance that plugins have not been inadvertently or maliciously modified between plan and apply.
terraform state mv
will now error when legacy-backup
or-backup-out
options are used without the-state
option on non-local backends. These options operate on a local state file only. Previously, these options were accepted but ignored silently when used with non-local backends.In the AzureRM backend, the new opt-in option
use_microsoft_graph
switches to using MSAL authentication tokens and Microsoft Graph rather than using ADAL tokens and Azure Active Directory Graph, which is now deprecated by Microsoft. The new mode will become the default in Terraform v1.2, so please plan to migrate to using this setting and test with your own Azure AD tenant prior to the Terraform v1.2 release.ENHANCEMENTS:
source
argument inmodule
blocks) during configuration decoding rather than only at module installation time. This is largely just an internal refactoring, but a visible benefit of this change is that theterraform init
messages about module downloading will now show the canonical module package address Terraform is downloading from, after interpreting the special shorthands for common cases like GitHub URLs. (#28854)nullable = false
ensures that a variable value will never benull
, and may instead take on the variable's default value if the caller sets it explicitly tonull
. (#29832)terraform plan
andterraform apply
: When Terraform plans to destroy a resource instance due to it no longer being declared in the configuration, the proposed plan output will now include a note hinting at what situation prompted that proposal, so you can more easily see what configuration change might avoid the object being destroyed. (#29637)terraform plan
andterraform apply
: Terraform will now report explicitly in the UI if it automatically moves a resource instance to a new address as a result of adding or removing thecount
argument from an existing resource. For example, if you previously hadresource "aws_subnet" "example"
withoutcount
, you might haveaws_subnet.example
already bound to a remote object in your state. If you addcount = 1
to that resource then Terraform would previously silently rebind the object toaws_subnet.example[0]
as part of planning, whereas now Terraform will mention that it did so explicitly in the plan description. (#29605)terraform workspace delete
: will now allow deleting a workspace whose state contains only data resource instances and output values, without runningterraform destroy
first. Previously the presence of data resources would require using-force
to override the safety check guarding against accidentally forgetting about remote objects, but a data resource is not responsible for the management of its associated remote object(s) and so there's no reason to require explicit deletion. (#29754)terraform validate
: Terraform now uses precise type information for resources during config validation, allowing more problems to be caught that that step rather than only during the planning step. (#29862)terraform state mv
will now return an error for-backup
or-backup-out
options used without the-state
option, unless the working directory is initialized to use the local backend. Previously Terraform would silently ignore those options, since they are applicable only to the local backend. (#27908)terraform console
: now has a newtype()
function, available only in the interactive console, for inspecting the exact type of a particular value as an aid to debugging. (#28501)BUG FIXES:
ignore_changes = all
now works in override files. (#29849)depends_on
arguments referring to not-yet-converged managed resources. (#29682)ignore_changes
can no longer cause a null map to be converted to an empty map, which would otherwise potentially cause surprising side-effects in provider logic. (#29928)terraform plan
: Improved rendering of changes inside attributes that accept lists, sets, or maps of nested object types. (#29827, #29983, #29986)terraform apply
: Will no longer try to apply a stale plan that was generated against an originally-empty state. Previously this was an unintended exception to the rule that a plan can only be applied to the state snapshot it was generated against. (#29755)terraform show -json
: Attributes that are declared as using the legacy Attributes as Blocks behavior are now represented more faithfully in the JSON plan output. (#29522)terraform init
: Will now update the backend configuration hash value at a more approprimate time, to ensure properly restarting a backend migration process that failed on the first attempt. (#29860)assume_role
block arguments, so that they are more compatible with theterraform_remote_state
data source. (#29307)v1.0.11
Compare Source
1.0.11 (November 10, 2021)
ENHANCEMENTS:
sts_endpoint
(#29841)BUG FIXES:
ignore_changes = all
would not work in override files (#29849)v1.0.10
Compare Source
1.0.10 (October 28, 2021)
BUG FIXES:
-lock
and-lock-timeout
flags for theinit
command, which were removed in 0.15.0 (#29773)terraform init -input=false
would hang waiting for user input to choose a workspace (#29805)v1.0.9
Compare Source
1.0.9 (October 13, 2021)
BUG FIXES:
v1.0.8
Compare Source
1.0.8 (September 29, 2021)
BUG FIXES:
required_version
as early as possibly duringinit
so that version incompatibility can be reported before errors about new syntax (#29665)v1.0.7
Compare Source
1.0.7 (September 15, 2021)
BUG FIXES:
v1.0.6
Compare Source
1.0.6 (September 03, 2021)
ENHANCEMENTS:
BUG FIXES:
-force-copy
flag and migrating state between multiple workspaces. (#29438)v1.0.5
Compare Source
1.0.5 (August 18, 2021)
BUG FIXES:
terraform plan -json
structured logs, bringing this format into parity with the human-readable UI. (#29312)formatlist
, ensuring the correct resulting type. (#29408)floor
andceil
can no longer mutate their arguments. (#29408)v1.0.4
Compare Source
1.0.4 (August 04, 2021)
BUG FIXES:
v1.0.3
Compare Source
1.0.3 (July 21, 2021)
ENHANCEMENTS
terraform plan
: The JSON logs (-json
option) will now includeresource_drift
, showing changes detected outside of Terraform during the refresh step. (#29072)max_request_bytes
allows larger requests and for the client, to match the server request limit. (#28078)BUG FIXES:
terraform plan
: Will no longer panic when trying to render null maps. (#29207)v1.0.2
Compare Source
1.0.2 (July 07, 2021)
BUG FIXES:
terraform show
: Fix crash when rendering JSON plan with sensitive values in state (#29049)floor
andceil
functions no longer lower the precision of arguments to what would fit inside a 64-bit float, instead preserving precision in a similar way as most other arithmetic functions. (#29110)flatten
function was incorrectly treating null values of an unknown type as if they were unknown values. Now it will treat them the same as any other non-list/non-tuple value, flattening them down into the result as-is. (#29110)v1.0.1
Compare Source
1.0.1 (June 24, 2021)
ENHANCEMENTS:
BUG FIXES:
setproduct
with unknown values (#28984)v1.0.0
Compare Source
1.0.0 (June 08, 2021)
Terraform v1.0 is an unusual release in that its primary focus is on stability, and it represents the culmination of several years of work in previous major releases to make sure that the Terraform language and internal architecture will be a suitable foundation for forthcoming additions that will remain backward compatible.
Terraform v1.0.0 intentionally has no significant changes compared to Terraform v0.15.5. You can consider the v1.0 series as a direct continuation of the v0.15 series; we do not intend to issue any further releases in the v0.15 series, because all of the v1.0 releases will be only minor updates to address bugs.
For all future minor releases with major version 1, we intend to preserve backward compatibility as described in detail in the Terraform v1.0 Compatibility Promises. The later Terraform v1.1.0 will, therefore, be the first minor release with new features that we will implement with consideration of those promises.
v0.15.5
Compare Source
0.15.5 (June 02, 2021)
BUG FIXES:
terraform plan
andterraform apply
: Don't show "Objects have changed" notification when the detected changes are only internal details related to legacy SDK quirks. (#28796)v0.15.4
Compare Source
0.15.4 (May 19, 2021)
NEW FEATURES:
Noting changes made outside of Terraform: Terraform has always, by default, made a point during the planning operation of reading the current state of remote objects in order to detect any changes made outside of Terraform, to make sure the plan will take those into account.
Terraform will now report those detected changes as part of the plan result, in order to give additional context about the planned changes. We've often heard that people find it confusing when a plan includes a change that doesn't seem to be prompted by any recent change in the configuration, and so this feature is aiming to provide the previously-missing explanation for situations where Terraform is planning to undo a change.
It can also be useful just as general information when the change won't be undone by Terraform: if you've intentionally made a change outside of Terraform and mirrored that change in your configuration then Terraform will now confirm that it noticed the change you made and took it into account when planning.
By default this new output is for information only and doesn't change any behavior. If Terraform detects a change you were expecting then you don't need to take any additional action to respond to it. However, we've also added a new planning mode
-refresh-only
which allows you to explicitly plan and apply the action of writing those detected changes to the Terraform state, which serves as a plannable replacement forterraform refresh
. We don't have any plans to remove the long-standingterraform refresh
command, but we do recommend usingterraform apply -refresh-only
instead in most cases, because it will provide an opportunity to review what Terraform detected before updating the Terraform state.UPGRADE NOTES:
resource.
,template.
,arg.
, andlazy.
. We don't expect these additions to cause problems for most existing configurations, but could cause a conflict if you are using a custom provider which has a resource type named exactly "resource", "template", "arg", or "lazy". In that unlikely event, you can escape references to resources of those types by adding aresource.
prefix; for example, if you have aresource "template" "foo"
then you can change references to it fromtemplate.foo
toresource.template.foo
in order to escape the new meaning.ENHANCEMENTS:
filesha256
, will now stream the contents of the given file into the hash function in smaller chunks. Previously they would always read the entire file into memory before hashing it, due to following a similar implementation strategy as thefile
function. (#28681)terraform init
: add a new-migrate-state
flag instead of automatic state migration, to prevent failing when old backend config is not usable (#28718)terraform plan
andterraform apply
: will now report any changes Terraform detects during the "refresh" phase for each managed object, providing confirmation that Terraform has seen those changes and, where appropriate, extra context to help understand the planned change actions that follow. (#28634)terraform plan
andterraform apply
: now have a new option-refresh-only
to activate the "refresh only" planning mode, which causes Terraform to ignore any changes suggested by the configuration but still detect any changes made outside of Terraform since the latestterraform apply
. (#28634)GOOGLE_APPLICATION_CREDENTIALS
environment variable. This is also available in the Google Provider in versions newer than v3.61. (#28296)-refresh=false
,-replace
, and-refresh-only
. (#28746)BUG FIXES:
bastion_port
in a resourceconnection
block (#28665)create_before_destroy
replacement failed to destroy the old object, in which case Terraform needs to track both the new and old objects until the old object is successfully deleted. Refreshing these during planning means that you can, if you wish, delete a "deposed" object manually outside of Terraform and then have Terraform detect that you've done so. (#28634)lookup
andlength
functions, which were accidentally omitted from the larger update in 0.15.1 (#28509)v0.15.3
Compare Source
0.15.3 (May 06, 2021)
ENHANCEMENTS:
terraform show
: Add data to the JSON plan output describing which changes caused a resource to be replaced (#28608)BUG FIXES:
terraform show
: Fix crash for JSON plan output of new resources with sensitive attributes in nested blocks (#28624)v0.15.2
Compare Source
0.15.2 (May 05, 2021)
ENHANCEMENTS:
terraform plan
andterraform apply
: Both now support a new planning option-replace=...
which takes the address of a resource instance already tracked in the state and forces Terraform to upgrade either an update or no-op plan for that instance into a "replace" (either destroy-then-create or create-then-destroy depending on configuration), to allow replacing a degraded object with a new object of the same configuration in a single action and preview the effect of that before applying it.terraform apply
: Now has a-destroy
option for symmetry withterraform plan -destroy
, which makesterraform destroy
effectively an alias forterraform apply -destroy
. This change is only for consistency betweenterraform plan
andterraform apply
; there are no current plans to deprecateterraform destroy
. (#28489)BUG FIXES:
setproduct
with one or more empty collections (#28607)v0.15.1
Compare Source
0.15.1 (April 26, 2021)
ENHANCEMENTS:
config: Various Terraform language functions now have more precise inference rules for propagating the "sensitive" characteristic values.
The affected functions are
chunklist
,concat
,flatten
,keys
,length
,lookup
,merge
,setproduct
,tolist
,tomap
,values
, andzipmap
. The details are a little different for each of these but the general idea is to, as far as possible, preserve the sensitive characteristic on individual element or attribute values in result structures rather than always conservatively applying sensitivity to the whole result.The primary benefit of these improvements is that you can now use these functions as part of constructing maps for
for_each
in situations where the input collection is never sensitive but some of the elements/attributes inside might be. (#28446] [#28460)cli: Update the HashiCorp public key (#28505)
cli: Diagnostic messages can now be annotated with resource and provider addresses. (#28275)
cli:
terraform login
now has a new user experience for successful log-ins to Terraform Cloud and Terraform Enterprise. (#28487)core: Minor graph performance optimizations. (#28329)
BUG FIXES:
sensitive
attribute for sensitive values remains, with an extended diagnostic message to explain why. (#28472)v0.15.0
Compare Source
0.15.0 (April 14, 2021)
UPGRADE NOTES AND BREAKING CHANGES:
The following is a summary of each of the changes in this release that might require special consideration when upgrading. Refer to the Terraform v0.15 upgrade guide for more details and recommended upgrade steps.
"Proxy configuration blocks" (provider blocks with only
alias
set) in shared modules are now replaced with a more explicitconfiguration_aliases
argument within therequired_providers
block. Some support for the old syntax is retained for backward compatibility, but we've added explicit error messages for situations where Terraform would previously silently misinterpret the purpose of an emptyprovider
block. (#27739)The
list
andmap
functions, both of which were deprecated since Terraform v0.12, are now removed. You can replace uses of these functions withtolist([...])
andtomap({...})
respectively. (#26818)Terraform now requires UTF-8 character encoding and virtual terminal support when running on Windows. This unifies Terraform's terminal handling on Windows with that of other platforms, as per Microsoft recommendations. Terraform previously required these terminal features on all other platforms, and now requires them on Windows too.
UTF-8 and virtual terminal support were introduced across various Windows 10 updates, and so Terraform is no longer officially supported on the original release of Windows 10 or on Windows 8 and earlier. However, there are currently no technical measures to artificially prevent Terraform from running on these obsolete Windows releases, and so you may still be able to use Terraform v0.15 on older Windows versions if you either disable formatting (using the
-no-color
) option, or if you use a third-party terminal emulator package such as ConEmu, Cmder, or mintty.We strongly encourage planning to migrate to a newer version of Windows rather than relying on these workarounds for the long term, because the Terraform team will test future releases only on up-to-date Windows 10 and can therefore not guarantee ongoing support for older versions.
Built-in vendor provisioners (chef, habitat, puppet, and salt-masterless) have been removed. (#26938)
Interrupting execution will now cause terraform to exit with a non-zero exit status. (#26738)
The trailing
[DIR]
argument to specify the working directory for various commands is no longer supported. Use the global-chdir
option instead. (#27664)For example, instead of
terraform init infra
, writeterraform -chdir=infra init
.The
-lock
and-lock-timeout
options are no longer available onterraform init
(#27464)The
-verify-plugins=false
option is no longer available onterraform init
. (Terraform now always verifies plugins.) (#27461)The
-get-plugins=false
option is no longer available onterraform init
. (Terraform now always installs plugins.) (#27463)The
-force
option is no longer available onterraform destroy
. Use-auto-approve
instead (#27681)The
-var
and-var-file
options are no longer available onterraform validate
. These were deprecated and have had no effect since Terraform v0.12. (#27906)terraform version -json
output no longer includes the (previously-unpopulated) "revision" property (#27484)In the
gcs
backend thepath
config argument, which was deprecated since Terraform v0.11, is now removed. Use theprefix
argument instead. (#26841)The deprecated
ignore_changes = ["*"]
wildcard syntax is no longer supported. Useignore_changes = all
instead. (#27834)Previously deprecated quoted variable type constraints are no longer supported. Follow the instructions in the error message to update your type signatures to be more explicit. For example, use
map(string)
instead of"map"
. (#27852)Terraform will no longer make use of the
HTTP_PROXY
environment variable to determine proxy settings for connecting to HTTPS servers. You must always setHTTPS_PROXY
if you intend to use a proxy to connect to an HTTPS server. (Note: This affects only connections made directly from Terraform CLI. Terraform providers are separate programs that make their own requests and may thus have different proxy configuration behaviors.)Provider-defined sensitive attributes will now be redacted throughout the plan output. You may now see values redacted as
(sensitive)
that were previously visible, because sensitivity did not follow provider-defined sensitive attributes.If you are transforming a value and wish to force it not to be sensitive, such as if you are transforming a value in such a way that removes the sensitive data, we recommend using the new
nonsensitive
function to hint Terraform that the result is not sensitive.The
atlas
backend, which was deprecated since Terraform v0.12, is now removed. (#26651)We've upgraded the underlying TLS and certificate-related libraries that Terraform uses when making HTTPS requests to remote systems. This includes the usual tweaks to preferences for different cryptographic algorithms during handshakes and also some slightly-stricter checking of certificate syntax. These changes should not cause problems for correctly-implemented HTTPS servers, but can sometimes cause unexpected behavior changes with servers or middleboxes that don't comply fully with the relevant specifications.
ENHANCEMENTS:
required_providers
entry can now containconfiguration_aliases
to declare additional configuration aliases names without requirring a configuration block (#27739)one
for concisely converting a zero-or-one element list/set into a single value that might benull
. (#27454)sensitive
andnonsensitive
allow module authors to explicitly override Terraform's default infererence of value sensitivity for situations where it's too conservative or not conservative enough. (#27341)backend
block in a non-root module. Terraform has always ignored such declarations, but previously did so silently. This is a warning rather than an error only because it is sometimes convenient to temporarily use a root module as if it were a child module in order to test or debug its behavior separately from its main backend. (#26954)terraform fmt
now automatically fixes most cases that the warning would previously highlight. We still recommend using simpler expressions where possible, but the deprecation warning had caused a common confusion in the community that the interpolation syntax is always deprecated, rather than only in the interpolation-only case. (#27835)terraform init
: Will now make suggestions for possible providers on some registry failures, and generally remind ofrequired_providers
on all registry failures. (#28014)terraform init
: Provider installation will now only attempt to rewrite.terraform.lock.hcl
if it would contain new information. (#28230)terraform init
: New-lockfile=readonly
option, which suppresses writing changes to the dependency lock file. Any installed provider packages must already be recorded in the lock file, or initialization will fail. Use this if you are managing the lock file via a separate process and want to avoid adding new checksums for existing dependencies. (#27630)terraform show
: Improved performance when rendering large plans as JSON. (#27998)terraform validate
: The JSON output now includes a code snippet object for each diagnostic. If present, this object contains an excerpt of the source code which triggered the diagnostic, similar to what Terraform would include in human-oriented diagnostic messages. (#28057)terraform destory
instead ofdestroy
, will now print out a specific error message about the command being invalid, rather than just printing out the usual help directory. (#26967)TF_LOG_CORE
andTF_LOG_PROVIDER
(#26685)BUG FIXES:
defaults
function. (#27979, #28067)terraform validate
: Validation now ignores providers that lack configuration, which is useful for validating modules intended to be called from other modules which therefore don't include their own provider configurations. (#24896)terraform fmt
: Fixfmt
output when unwrapping redundant multi-line string interpolations (#28202)terraform console
: expressions usingpath
(path.root
,path.module
) now return the same result as they would in a configuration (#27263)terraform show
: Fix crash when rendering JSON plans containing iterable unknown values. (#28253)terraform show
: fix issue withchild_modules
not properly displaying in certain circumstances. (#27352)terraform state list
: fix bug where nested modules' resources were missing (#27268)terraform state mv
: fix display names in errors and improve error when failing to target a whole resource (#27482)terraform taint
: show resource name in -allow-missing warning (#27501)terraform untaint
: show resource name in -allow-missing warning (#27502)-input=false
. Previously Terraform would behave as if the user entered an empty string, which often led to confusing results. (#26509)TF_LOG
levels other thantrace
will now work reliably. (#26632)-refresh=false
. (#28272)terraform show saved.tfplan
matchesterraform plan
, and sensitive values are elided. (#28201)create_before_destroy
ordering is preserved. (#28228)EXPERIMENTS:
provider_sensitive_attrs
: This experiment has now concluded, and its functionality is now on by default. If you were previously participating in this experiment then you can remove the experiment opt-in with no other necessary configuration changes.terraform test
command, which is currently an experimental feature serving as part of the Module Testing Experiment.v0.14.11
Compare Source
0.14.11 (April 26, 2021)
ENHANCEMENTS:
v0.14.10
Compare Source
0.14.10 (April 07, 2021)
BUG FIXES:
v0.14.9
Compare Source
0.14.9 (March 24, 2021)
BUG FIXES:
v0.14.8
Compare Source
BUG FIXES:
ENHANCEMENTS:
[
v0.14.7
](httpsConfiguration
📅 Schedule: At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.