Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump github.com/hashicorp/terraform from 0.12.5 to 0.12.6 in /tools #373

Conversation

dependabot-preview[bot]
Copy link
Contributor

@dependabot-preview dependabot-preview bot commented Jul 31, 2019

Bumps github.com/hashicorp/terraform from 0.12.5 to 0.12.6.

Release notes

Sourced from github.com/hashicorp/terraform's releases.

v0.12.6

NOTES:

  • backend/s3: After this update, the AWS Go SDK will prefer credentials found via the AWS_PROFILE environment variable when both the AWS_PROFILE environment variable and the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables are statically defined. Previously the SDK would ignore the AWS_PROFILE environment variable, if static environment credentials were also specified. This is listed as a bug fix in the AWS Go SDK release notes. (#22253)

NEW FEATURES:

  • backend/oss: added support for assume role config (#22186)
  • config: Resources can now use a for_each meta-argument (#17179)

ENHANCEMENTS:

  • backend/s3: Add support for assuming role via web identity token via the AWS_WEB_IDENTITY_TOKEN_FILE and AWS_ROLE_ARN environment variables (#22253)
  • backend/s3: Support automatic region validation for me-south-1. For AWS operations to work in the new region, the region must be explicitly enabled as outlined in the AWS Documentation (#22253)
  • connection/ssh: Improve connection debug messages (#22097)

BUG FIXES:

  • backend/remote: remove misleading contents from error message (#22148)
  • backend/s3: Load credentials via the AWS_PROFILE environment variable (if available) when AWS_PROFILE is defined along with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY (#22253)
  • config: Improve conditionals to returns the correct type when dynamic values are present but unevaluated (#22137)
  • config: Fix panic when mistakingly using dynamic on an attribute (#22169)
  • cli: Fix crash with reset connection during init (#22146)
  • cli: show all deposed instances and prevent crash in show command (#22149)
  • configs/configupgrade: Fix crash with nil hilNode (#22181)
  • command/fmt: now formats correctly in presence of here-docs (#21434)
  • helper/schema: don't skip deprecation check during validation when attribute value is unknown (#22262)
  • plugin/sdk: allow MinItems > 1 when dynamic blocks (#22221)
  • plugin/sdk: fix reflect panics in helper/schema validation (#22236)
Changelog

Sourced from github.com/hashicorp/terraform's changelog.

0.12.6 (July 31, 2019)

NOTES:

  • backend/s3: After this update, the AWS Go SDK will prefer credentials found via the AWS_PROFILE environment variable when both the AWS_PROFILE environment variable and the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables are statically defined. Previously the SDK would ignore the AWS_PROFILE environment variable, if static environment credentials were also specified. This is listed as a bug fix in the AWS Go SDK release notes. (#22253)

NEW FEATURES:

  • backend/oss: added support for assume role config (#22186)
  • config: Resources can now use a for_each meta-argument (#17179)

ENHANCEMENTS:

  • backend/s3: Add support for assuming role via web identity token via the AWS_WEB_IDENTITY_TOKEN_FILE and AWS_ROLE_ARN environment variables (#22253)
  • backend/s3: Support automatic region validation for me-south-1. For AWS operations to work in the new region, the region must be explicitly enabled as outlined in the AWS Documentation (#22253)
  • connection/ssh: Improve connection debug messages (#22097)

BUG FIXES:

  • backend/remote: remove misleading contents from error message (#22148)
  • backend/s3: Load credentials via the AWS_PROFILE environment variable (if available) when AWS_PROFILE is defined along with AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY (#22253)
  • config: Improve conditionals to returns the correct type when dynamic values are present but unevaluated (#22137)
  • config: Fix panic when mistakingly using dynamic on an attribute (#22169)
  • cli: Fix crash with reset connection during init (#22146)
  • cli: show all deposed instances and prevent crash in show command (#22149)
  • configs/configupgrade: Fix crash with nil hilNode (#22181)
  • command/fmt: now formats correctly in presence of here-docs (#21434)
  • helper/schema: don't skip deprecation check during validation when attribute value is unknown (#22262)
  • plugin/sdk: allow MinItems > 1 when dynamic blocks (#22221)
  • plugin/sdk: fix reflect panics in helper/schema validation (#22236)
Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot ignore this [patch|minor|major] version will close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it). To ignore the version in this PR you can just close it
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language
  • @dependabot badge me will comment on this PR with code to add a "Dependabot enabled" badge to your readme

Additionally, you can set the following in your Dependabot dashboard:

  • Update frequency (including time of day and day of week)
  • Pull request limits (per update run and/or open at any time)
  • Out-of-range updates (receive only lockfile updates, if desired)
  • Security updates (receive only security updates, if desired)

Finally, you can contact us by mentioning @dependabot.

Bumps [github.com/hashicorp/terraform](https://github.com/hashicorp/terraform) from 0.12.5 to 0.12.6.
- [Release notes](https://github.com/hashicorp/terraform/releases)
- [Changelog](https://github.com/hashicorp/terraform/blob/master/CHANGELOG.md)
- [Commits](hashicorp/terraform@v0.12.5...v0.12.6)

Signed-off-by: dependabot-preview[bot] <support@dependabot.com>
@dependabot-preview dependabot-preview bot added the dependencies Pull requests that update a dependency file label Jul 31, 2019
@nlarzon
Copy link

nlarzon commented Aug 1, 2019

Gr8. When can we get it in?

@wata727 wata727 merged commit bfe3bde into master Aug 2, 2019
@wata727 wata727 deleted the dependabot/go_modules/tools/github.com/hashicorp/terraform-0.12.6 branch August 2, 2019 12:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Development

Successfully merging this pull request may close these issues.

None yet

2 participants