Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update terraform random to ~> 3.6.0 #10

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jun 15, 2024

This PR contains the following updates:

Package Type Update Change
random (source) required_provider minor ~> 3.0.0 -> ~> 3.6.0

Release Notes

hashicorp/terraform-provider-random (random)

v3.6.3

Compare Source

NOTES:

  • all: This release introduces no functional changes. It does however include dependency updates which address upstream CVEs. (#​604)

v3.6.2

Compare Source

NOTES:

  • resource/random_pet: Results have been updated to the latest upstream petname data (#​581)

v3.6.1

Compare Source

BUG FIXES:

  • all: Prevent keepers from triggering an in-place update following import (#​385)
  • resource/random_shuffle: Prevent inconsistent result after apply when result_count is set to 0 (#​409)
  • provider/random_password: Fix bug which causes panic when special, upper, lower and number/numeric are all false (#​551)
  • provider/random_string: Fix bug which causes panic when special, upper, lower and number/numeric are all false (#​551)

v3.6.0

Compare Source

FEATURES:

  • resource/random_bytes: New resource that generates an array of random bytes intended to be used as key or secret (#​272)

v3.5.1

Compare Source

BUG FIXES:

  • resource/random_password: Prevent error with bcrypt by truncating the bytes that are hashed to a maximum length of 72 (#​397)

v3.5.0

Compare Source

NOTES:

  • This Go module has been updated to Go 1.19 per the Go support policy. Any consumers building on earlier Go versions may experience errors. (#​378)

v3.4.3

Compare Source

NOTES:

  • resource/random_password: The values for lower, number, special, upper, min_lower, min_numeric, min_special, min_upper and length could be null if the resource was imported using version 3.3.1 or before. The value for length will be automatically calculated and assigned and default values will be assigned for the other attributes listed after this upgrade (#​313)
  • resource/random_string: The values for lower, number, special, upper, min_lower, min_numeric, min_special, min_upper and length could be null if the resource was imported using version 3.3.1 or before. The value for length will be automatically calculated and assigned and default values will be assigned for the other attributes listed after this upgrade (#​313)
  • resource/random_password: If the resource was created between versions 3.4.0 and 3.4.2, the bcrypt_hash value would not correctly verify against the result value. Affected resources will automatically regenerate a valid bcrypt_hash after this upgrade. (#​308)
  • resource/random_password: The override_special attribute may show a plan difference from empty string ("") to null if previously applied with version 3.4.2. The plan should show this as an in-place update and it should occur only once after upgrading. (#​312)
  • resource/random_string: The override_special attribute may show a plan difference from empty string ("") to null if previously applied with version 3.4.2. The plan should show this as an in-place update and it should occur only once after upgrading. (#​312)

BUG FIXES:

  • resource/random_password: Assign default values to lower, number, special, upper, min_lower, min_numeric, min_special and min_upper if null. Assign length of result to length if null (#​313)
  • resource/random_string: Assign default values to lower, number, special, upper, min_lower, min_numeric, min_special and min_upper if null. Assign length of result to length if null (#​313)
  • resource/random_password: Fixed incorrect bcrypt_hash generation since version 3.4.0 (#​308)
  • resource/random_password: Prevented difference with override_special when upgrading from version 3.3.2 and earlier (#​312)
  • resource/random_string: Prevented difference with override_special when upgrading from version 3.3.2 and earlier (#​312)

v3.4.2

Compare Source

BUG FIXES:

  • all: Prevent keeper with null values from forcing replacement (305).
  • resource/random_password: During upgrade state, ensure min_upper is populated (304).
  • resource/random_string: During upgrade state, ensure min_upper is populated (304).

v3.4.1

Compare Source

BUG FIXES:

  • resource/random_password: During attribute plan modifier, only return error if number and numeric are both present and do not match (301).
  • resource/random_string: During attribute plan modifier, only return error if number and numeric are both present and do not match (301).

v3.4.0

Compare Source

NOTES:

  • Provider has been re-written using the new terraform-plugin-framework (#​177).
  • resource/random_password: number was deprecated in v3.3.0 and will be removed in the next major release.
  • resource/random_string: number was deprecated in v3.3.0 and will be removed in the next major release.

v3.3.2

Compare Source

BUG FIXES:

  • resource/random_password: When importing set defaults for all attributes that have a default defined (256).
  • resource/random_string: When importing set defaults for all attributes that have a default defined (256).

v3.3.1

Compare Source

BUG FIXES:

  • resource/random_password: During schema upgrade, copy value of attribute number to attribute numeric, only if said value is a boolean (i.e. not null) (262)
  • resource/random_string: During schema upgrade, copy value of attribute number to attribute numeric, only if said value is a boolean (i.e. not null) (262)

v3.3.0

Compare Source

ENHANCEMENTS:

  • resource/random_password: number is now deprecated and numeric has been added to align attribute naming. number will be removed in the next major release (#​258).
  • resource/random_string: number is now deprecated and numeric has been added to align attribute naming. number will be removed in the next major release (#​258).

v3.2.0

Compare Source

NEW FEATURES:

  • resource/random_password: New attribute bcrypt_hash, which is the hashed password (73, 102, 254)

NOTES:

  • Adds or updates DESIGN.md, README.md, CONTRIBUTING.md and SUPPORT.md docs (176, 235, 242).
  • Removes usage of deprecated fields, types and functions (243, 244).
  • Tests all minor Terraform versions (238, 241)
  • Switches to linting with golangci-lint (237, 240).

v3.1.3

Compare Source

BUG FIXES:

  • resource/random_password: Prevent crash when length is less than 0 (#​129, #​181, #​200, #​233).
  • resource/random_string: Prevent crash when length is less than 0 (#​129, #​181, #​200, #​233).
  • resource/random_password: Prevent confusing inconsistent result error when length is 0 (#​222, #​233).
  • resource/random_string: Prevent confusing inconsistent result error when length is 0 (#​222, #​233).

v3.1.2

Compare Source

BUG FIXES:

  • resource/random_pet: Prevented deterministic results since 3.1.1 (#​217.

v3.1.1

Compare Source

NOTES:

  • Updated terraform-plugin-docs to v0.7.0:
    this improves generated documentation, with attributes now correctly formatted as code
    and provided with anchors.
  • Functionally identical to the previous 3.1.0 release.

v3.1.0

Compare Source

Binary releases of this provider now include the darwin-arm64 platform. This version contains no further changes.


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants