Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update terraform random to v3.6.3 #4

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Aug 30, 2022

This PR contains the following updates:

Package Type Update Change
random (source) required_provider minor 3.3.2 -> 3.6.3

Release Notes

hashicorp/terraform-provider-random (random)

v3.6.3

Compare Source

NOTES:

  • all: This release introduces no functional changes. It does however include dependency updates which address upstream CVEs. (#​604)

v3.6.2

Compare Source

NOTES:

  • resource/random_pet: Results have been updated to the latest upstream petname data (#​581)

v3.6.1

Compare Source

BUG FIXES:

  • all: Prevent keepers from triggering an in-place update following import (#​385)
  • resource/random_shuffle: Prevent inconsistent result after apply when result_count is set to 0 (#​409)
  • provider/random_password: Fix bug which causes panic when special, upper, lower and number/numeric are all false (#​551)
  • provider/random_string: Fix bug which causes panic when special, upper, lower and number/numeric are all false (#​551)

v3.6.0

Compare Source

FEATURES:

  • resource/random_bytes: New resource that generates an array of random bytes intended to be used as key or secret (#​272)

v3.5.1

Compare Source

BUG FIXES:

  • resource/random_password: Prevent error with bcrypt by truncating the bytes that are hashed to a maximum length of 72 (#​397)

v3.5.0

Compare Source

NOTES:

  • This Go module has been updated to Go 1.19 per the Go support policy. Any consumers building on earlier Go versions may experience errors. (#​378)

v3.4.3

Compare Source

NOTES:

  • resource/random_password: The values for lower, number, special, upper, min_lower, min_numeric, min_special, min_upper and length could be null if the resource was imported using version 3.3.1 or before. The value for length will be automatically calculated and assigned and default values will be assigned for the other attributes listed after this upgrade (#​313)
  • resource/random_string: The values for lower, number, special, upper, min_lower, min_numeric, min_special, min_upper and length could be null if the resource was imported using version 3.3.1 or before. The value for length will be automatically calculated and assigned and default values will be assigned for the other attributes listed after this upgrade (#​313)
  • resource/random_password: If the resource was created between versions 3.4.0 and 3.4.2, the bcrypt_hash value would not correctly verify against the result value. Affected resources will automatically regenerate a valid bcrypt_hash after this upgrade. (#​308)
  • resource/random_password: The override_special attribute may show a plan difference from empty string ("") to null if previously applied with version 3.4.2. The plan should show this as an in-place update and it should occur only once after upgrading. (#​312)
  • resource/random_string: The override_special attribute may show a plan difference from empty string ("") to null if previously applied with version 3.4.2. The plan should show this as an in-place update and it should occur only once after upgrading. (#​312)

BUG FIXES:

  • resource/random_password: Assign default values to lower, number, special, upper, min_lower, min_numeric, min_special and min_upper if null. Assign length of result to length if null (#​313)
  • resource/random_string: Assign default values to lower, number, special, upper, min_lower, min_numeric, min_special and min_upper if null. Assign length of result to length if null (#​313)
  • resource/random_password: Fixed incorrect bcrypt_hash generation since version 3.4.0 (#​308)
  • resource/random_password: Prevented difference with override_special when upgrading from version 3.3.2 and earlier (#​312)
  • resource/random_string: Prevented difference with override_special when upgrading from version 3.3.2 and earlier (#​312)

v3.4.2

Compare Source

BUG FIXES:

  • all: Prevent keeper with null values from forcing replacement (305).
  • resource/random_password: During upgrade state, ensure min_upper is populated (304).
  • resource/random_string: During upgrade state, ensure min_upper is populated (304).

v3.4.1

Compare Source

BUG FIXES:

  • resource/random_password: During attribute plan modifier, only return error if number and numeric are both present and do not match (301).
  • resource/random_string: During attribute plan modifier, only return error if number and numeric are both present and do not match (301).

v3.4.0

Compare Source

NOTES:

  • Provider has been re-written using the new terraform-plugin-framework (#​177).
  • resource/random_password: number was deprecated in v3.3.0 and will be removed in the next major release.
  • resource/random_string: number was deprecated in v3.3.0 and will be removed in the next major release.

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot changed the title Update Terraform random to v3.4.0 Update Terraform random to v3.4.1 Aug 31, 2022
@renovate renovate bot force-pushed the renovate/random-3.x branch from c9a363d to 3d85f86 Compare August 31, 2022 15:42
@renovate renovate bot changed the title Update Terraform random to v3.4.1 Update Terraform random to v3.4.2 Sep 2, 2022
@renovate renovate bot force-pushed the renovate/random-3.x branch 2 times, most recently from 4192616 to 7f27975 Compare September 7, 2022 07:47
@renovate renovate bot changed the title Update Terraform random to v3.4.2 Update Terraform random to v3.4.3 Sep 8, 2022
@renovate renovate bot force-pushed the renovate/random-3.x branch from 7f27975 to 544b059 Compare September 8, 2022 15:44
@renovate renovate bot changed the title Update Terraform random to v3.4.3 chore(deps): update terraform random to v3.4.3 Sep 27, 2022
@renovate renovate bot changed the title chore(deps): update terraform random to v3.4.3 chore(deps): update terraform random to v3.5.1 May 30, 2023
@renovate renovate bot force-pushed the renovate/random-3.x branch from 544b059 to e89413c Compare May 30, 2023 01:59
@renovate renovate bot changed the title chore(deps): update terraform random to v3.5.1 chore(deps): update terraform random to v3.6.0 Dec 5, 2023
@renovate renovate bot force-pushed the renovate/random-3.x branch from e89413c to f75df94 Compare December 5, 2023 02:37
@renovate renovate bot force-pushed the renovate/random-3.x branch from f75df94 to 0b76990 Compare April 18, 2024 08:57
@renovate renovate bot changed the title chore(deps): update terraform random to v3.6.0 chore(deps): update terraform random to v3.6.1 Apr 18, 2024
@renovate renovate bot force-pushed the renovate/random-3.x branch from 0b76990 to 933df38 Compare May 23, 2024 02:54
@renovate renovate bot changed the title chore(deps): update terraform random to v3.6.1 chore(deps): update terraform random to v3.6.2 May 23, 2024
@renovate renovate bot changed the title chore(deps): update terraform random to v3.6.2 chore(deps): update terraform random to v3.6.3 Sep 12, 2024
@renovate renovate bot force-pushed the renovate/random-3.x branch from 933df38 to eb9e793 Compare September 12, 2024 08:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants