-
Notifications
You must be signed in to change notification settings - Fork 6
Update dependency hashicorp/terraform to v1.14.2 #3484
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/terraform-monorepo
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Contributor
Plan Result (aat)
Change Result (Click me) # azurerm_key_vault_secret.flexible_secret_standard_format["DATABASE"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
~ expiration_date = "2027-12-11T11:05:38Z" -> (known after apply)
id = "https://bulk-scan-aat.vault.azure.net/secrets/processor-POSTGRES-DATABASE/ff57b9039f9544be979c275eb31b0769"
name = "processor-POSTGRES-DATABASE"
tags = {
"application" = "bulk-scan-print"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/bulk-scan-processor.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#rbs"
"environment" = "staging"
"managedBy" = "Bulk Scanning and Printing"
"source" = "processor PostgreSQL"
}
# (9 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret_standard_format["HOST"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
~ expiration_date = "2027-12-11T11:05:38Z" -> (known after apply)
id = "https://bulk-scan-aat.vault.azure.net/secrets/processor-POSTGRES-HOST/2dc8dc1977504071bd90e0c4b8a591fe"
name = "processor-POSTGRES-HOST"
tags = {
"application" = "bulk-scan-print"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/bulk-scan-processor.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#rbs"
"environment" = "staging"
"managedBy" = "Bulk Scanning and Printing"
"source" = "processor PostgreSQL"
}
# (9 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret_standard_format["PASS"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
~ expiration_date = "2027-12-11T11:05:38Z" -> (known after apply)
id = "https://bulk-scan-aat.vault.azure.net/secrets/processor-POSTGRES-PASS/f96764ee7960495181d327706327af90"
name = "processor-POSTGRES-PASS"
tags = {
"application" = "bulk-scan-print"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/bulk-scan-processor.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#rbs"
"environment" = "staging"
"managedBy" = "Bulk Scanning and Printing"
"source" = "processor PostgreSQL"
}
# (9 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret_standard_format["PORT"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
~ expiration_date = "2027-12-11T11:05:38Z" -> (known after apply)
id = "https://bulk-scan-aat.vault.azure.net/secrets/processor-POSTGRES-PORT/e6b64e0e09e54e39828f8891d838e308"
name = "processor-POSTGRES-PORT"
tags = {
"application" = "bulk-scan-print"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/bulk-scan-processor.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#rbs"
"environment" = "staging"
"managedBy" = "Bulk Scanning and Printing"
"source" = "processor PostgreSQL"
}
# (9 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret_standard_format["USER"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
~ expiration_date = "2027-12-11T11:05:38Z" -> (known after apply)
id = "https://bulk-scan-aat.vault.azure.net/secrets/processor-POSTGRES-USER/9f01ce8315674da5994d66e4761258b7"
name = "processor-POSTGRES-USER"
tags = {
"application" = "bulk-scan-print"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/bulk-scan-processor.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#rbs"
"environment" = "staging"
"managedBy" = "Bulk Scanning and Printing"
"source" = "processor PostgreSQL"
}
# (9 unchanged attributes hidden)
}
Plan: 0 to add, 5 to change, 0 to destroy. |
Contributor
Plan Result (prod)
|
2516231 to
cbe4fa6
Compare
cbe4fa6 to
ab35da6
Compare
ab35da6 to
1110cb7
Compare
1110cb7 to
b0e15e2
Compare
b0e15e2 to
315a218
Compare
315a218 to
d7430a4
Compare
d7430a4 to
266da75
Compare
266da75 to
fc07b4c
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
aat/add-or-update
dependencies
Pull requests that update a dependency file
ns:bsp
prd:bulk-scan
prod/destroy
rel:bulk-scan-processor-pr-3484
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.13.2->1.14.2Release Notes
hashicorp/terraform (hashicorp/terraform)
v1.14.2Compare Source
v1.14.1Compare Source
1.14.1 (December 3, 2025)
BUG FIXES:
test: allow ephemeral outputs in root modules (#37813)
Combinations of replace_triggered_by and -replace could result in some instances not being replaced (#37833)
providers lock: include providers required by terraform test (#37851)
Set state information in the proto request for the
GenerateResourceConfigRPC (#37896)actions: make after_create & after_update actions run after the resource has applied (#37936)
v1.14.0Compare Source
1.14.0 (November 19, 2025)
NEW FEATURES:
List Resources: List resources can be defined in
*.tfquery.hclfiles and allow querying and filterting existing infrastructure.A new Terraform command
terraform query: Executes list operations against existing infrastructure and displays the results. The command can optionally generate configuration for importing results into Terraform.A new GenerateResourceConfiguration RPC allows providers to create more precise configuration values during import. (#37515)
New top-level Actions block: Actions are provider defined and meant to codify use cases outside the normal CRUD model in your Terraform configuration. Providers can define Actions like
aws_lambda_invokeoraws_cloudfront_create_invalidationthat do something imparative outside of Terraforms normal CRUD model. You can configure such a side-effect with an action block and have actions triggered through the lifecycle of a resource or through passing the-invokeCLI flag. (#37553)ENHANCEMENTS:
terraform test: expected diagnostics will be included in test output when running in verbose mode" (#37362)
terraform test: ignore prevent_destroy attribute during when cleaning up tests" (#37364)
terraform stackscommand support for-helpflag (#37645)query: support offline validation of query files via -query flag in the validate command (#37671)
Updates to support the AWS European Sovereign Cloud (#37721)
BUG FIXES:
Retrieve all workspace variables while doing a
terraform import, include variables inherited from variable sets but not overwritten by the workspace. (#37241)Fix OSS backend proxy support by adding a proxy layer for OSS backend operations. Resolves #36897. (#36897)
console and test: return explicit diagnostics when referencing resources that were not included in the most recent operation. (#37663)
query: generate unique resource identifiers for results of expanded list resources (#37681)
The CLI now summarizes the number of actions invoked during
terraform apply, matching the plan output. (#37689)Allow filesystem functions to return inconsistent results when evaluated within provider configuration (#37854)
query: improve error handling for missing identity schemas (#37863)
UPGRADE NOTES:
The parallelism of Terraform operations within container runtimes may be reduced depending on the CPU bandwidth limit setting. (#37436)
Building Terraform 1.14 requires macOS Monterey or later (due to being built on Go 1.25 which imposes these requirements) (#37436)
Previous Releases
For information on prior major and minor releases, refer to their changelogs:
v1.13.5Compare Source
1.13.5 (November 5, 2025)
BUG FIXES:
impure functions could cause templatefile to incorrectly fail consistency checks (#37807)
Allow filesystem functions to return inconsistent results when evaluated within provider configuration (#37854)
v1.13.4Compare Source
1.13.4 (October 15, 2025)
BUG FIXES:
v1.13.3Compare Source
1.13.3 (September 17, 2025)
BUG FIXES:
Configuration
📅 Schedule: Branch creation - "after 7am and before 11am every weekday" in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.