This project is mirrored from https://:*****@github.com/hashicorp/terraform.git. Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
  1. 07 May, 2020 1 commit
  2. 06 May, 2020 5 commits
    • Pam Selle's avatar
      Update CHANGELOG.md · e1862644
      Pam Selle authored
      Unverified
      e1862644
    • Pam Selle's avatar
      Merge pull request #24696 from hashicorp/leetrout/remote-state-force-push · 60b3815a
      Pam Selle authored
      Add support for force pushing with the remote backend
      Unverified
      60b3815a
    • Lee Trout's avatar
      Add support for force pushing with the remote backend · cb0e20ca
      Lee Trout authored
      Both differing serials and lineage protections should be bypassed
      with the -force flag (in addition to resources).
      
      Compared to other backends we aren’t just shipping over the state
      bytes in a simple payload during the persistence phase of the push
      command and the force flag added to the Go TFE client needs to be
      specified at that time.
      
      To prevent changing every method signature of PersistState of the
      remote client I added an optional interface that provides a hook
      to flag the Client as operating in a force push context. Changing
      the method signature would be more explicit at the cost of not
      being used anywhere else currently or the optional interface pattern
      could be applied to the state itself so it could be upgraded to
      support PersistState(force bool) only when needed.
      
      Prior to this only the resources of the state were checked for
      changes not the lineage or the serial. To bring this in line with
      documented behavior noted above those attributes also have a “read”
      counterpart just like state has. These are now checked along with
      state to determine if the state as a whole is unchanged.
      
      Tests were altered to table driven test format and testing was
      expanded to include WriteStateForMigration and its interaction
      with a ClientForcePusher type.
      cb0e20ca
    • Pam Selle's avatar
      Merge pull request #24874 from hashicorp/pselle/modulecallexpansionvalidation · 3e420d5f
      Pam Selle authored
      Add more validation to expanding modules
      Unverified
      3e420d5f
    • Pam Selle's avatar
      Add more validation to expanding modules · 38e5d9c6
      Pam Selle authored
      38e5d9c6
  3. 05 May, 2020 4 commits
  4. 04 May, 2020 5 commits
  5. 03 May, 2020 1 commit
  6. 01 May, 2020 1 commit
  7. 30 Apr, 2020 7 commits
    • Kristin Laemmert's avatar
      internal/providercache: fix error message for protocol mismatch (#24818) · ce03f125
      Kristin Laemmert authored
      There was a bug in the installer trying to pass a nil error.
      Unverified
      ce03f125
    • James Bardin's avatar
      fix state mv to work without EachMode · 2bfaddcf
      James Bardin authored
      The only situation where `state mv` needs to understand the each mode is
      when with resource addresses that may reference a single instance, or a
      group of for_each or count instances. In this case we can differentiate
      the two by checking the existence of the NoKey instance key.
      2bfaddcf
    • James Bardin's avatar
      remove a few traces of states.EachMode · 15a95031
      James Bardin authored
      15a95031
    • James Bardin's avatar
      2 more tests that weren't correct · 98cf28b0
      James Bardin authored
      Found 2 more tests that still had dangling empty modules, which are now
      fixed.
      98cf28b0
    • James Bardin's avatar
      remove EachMode from resource state · f915c5d9
      James Bardin authored
      Due to the fact that resources can transition between each modes, trying
      to track the mode for a resource as a whole in state doesn't work,
      because there may be instances with a mode different from the resource
      as a whole. This is difficult for core to track, as this metadata being
      changed as a side effect from multiple places often causes core to see
      the incorrect mode when evaluating instances.
      
      Since core can always determine the correct mode to evaluate from the
      configuration, we don't need to interrogate the state to know the mode.
      Once core no longer needs to reference EachMode from states, the
      resource state can simply be a container for instances, and doesn't need
      to try and track the "current" mode.
      f915c5d9
    • Pam Selle's avatar
      Support reading module outputs in terraform console (#24808) · 87bce5f9
      Pam Selle authored
      * Include eval in output walk
      
      This allows outputs to be evaluated in the evalwalk,
      impacting terraform console. Outputs are still not evaluated
      for terraform console in the root module, so this has
      no impact on writing to state (as child module outputs are not
      written to state). Also adds test coverage to the console command,
      including for evaluating locals (another use of the evalwalk)
      Unverified
      87bce5f9
    • James Bardin's avatar
      Merge pull request #24751 from hashicorp/jbardin/mod-resource-evaluation · 67f66ee9
      James Bardin authored
      Resource (and module) evaluate improvements
      Unverified
      67f66ee9
  8. 28 Apr, 2020 6 commits
  9. 27 Apr, 2020 7 commits
  10. 25 Apr, 2020 3 commits