This project is mirrored from https://:*****@github.com/hashicorp/terraform.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 03 Oct, 2022 3 commits
-
-
Craig Wright authored
Update custom-conditions.mdx
-
James Bardin authored
Prevent errors from NoOp deposed changes
-
James Bardin authored
If a previously deposed object is deleted outside of Terraform, the next plan will result in a NoOp change for the deposed object. Fix the check to verify that the deposed object has an acceptable action rather than use the `update` flag.
-
- 30 Sep, 2022 2 commits
-
-
Martin Atkins authored
-
Martin Atkins authored
We originally included this warning because the go-cty-yaml module wasn't yet stable and it was also not extensively tested so it wasn't yet clear if its behavior would need to change in some less common cases we hadn't tested so far. However, go-cty-yaml had its v1.0.0 release some time ago and is now committed to preserving its current Marshal output unless it is found to be non-compliant with the YAML 1.2 specification. This doc change means that Terraform's yamlencode is now adopting a similar posture: - The exact style details produced by the function for a particular input are now frozen. It'll change only if we find that the function is producing output that isn't valid per the YAML spec. - If someone finds a YAML parser that cannot parse what yamlencode produces but what it produces is valid per the YAML 1.2 spec, we'll expect the parser to be corrected to better support the spec rather than changing the yamlencode output. There may be pragmatic exceptions if we encounter a situation we cannot anticipate yet, but the above will be our general rule. This is really just a specialization of the spirit of the v1.x Compatibility Promises, tailored specifically to this function.
-
- 29 Sep, 2022 3 commits
-
-
Martin Atkins authored
Once again we're caught out by sharing the same output value node type between the plan phase and the apply phase. To allow for some slight variation between plan and apply without drastic refactoring here we just add a new flag to nodeExpandOutput which is true only during the planning phase. This then allows us to register the checkable objects only during the planning phase and not incorrectly re-register them during the apply phase. It's incorrect to re-register during apply because we carry over the planned checkable objects from the plan phase into the apply phase so we can guarantee that the final state will have all of the same checkable objects that the plan did. This avoids a panic during the apply phase from the incorrect duplicate registration.
-
kmoe authored
-
Radek Simko authored
-
- 28 Sep, 2022 1 commit
-
-
James Bardin authored
filter computed attrs from `ignore_changes=all`
-
- 27 Sep, 2022 1 commit
-
-
Sarah French authored
* Update codeowner of gcs backend to SI team * Update CODEOWNERS of gcs backend
-
- 26 Sep, 2022 8 commits
-
-
zisom-hc authored
Made a change to code example within the *Preconditions and Postconditions* section so that it technically makes sense; prior it was missing the data resource that was being called within the precondition lifecycle event on line 135, and the aws_instance resource was not utilizing the ami being provided by the data source in line 129, so i changed that as well.
-
Martin Atkins authored
We use a non-pointer value for this particular node, which means that there can never be two root nodes in the same graph: the graph implementation will just coalesce them together when a second one is added. Our resource expansion code is relying on that coalescing so that it can subsume together multiple graphs for different modules instances into a single mega-graph with all instances across all module instances, with any root nodes coalescing together to produce a single root. This also updates one of the context tests that exercises resource expansion so that it will generate multiple resource instance nodes per module and thus potentially have multiple roots to coalesce together. However, we aren't currently explicitly validating the return values from DynamicExpand and so this test doesn't actually fail if the coalescing doesn't happen. We may choose to validate the DynamicExpand result in a later commit in order to make it more obvious if future modifications fail to uphold this invariant.
-
Martin Atkins authored
We previously did two levels of DynamicExpand to go from ConfigResource to AbsResource and then from AbsResource to AbsResourceInstance. We'll now do the full expansion from ConfigResource to AbsResourceInstance in a single DynamicExpand step inside nodeExpandPlannableResource. The new approach is essentially functionally equivalent to the old except that it fixes a bug in the previous implementation: we will now call checkState.ReportCheckableObjects only once for the entire set of instances for a particular resource, which is what the checkable objects infrastructure expects so that it can always mention all of the checkable objects in the check report even if we bail out partway through due to a downstream error. This is essentially the same code but now turned into additional methods on nodeExpandPlannableResource instead of having the extra graph node type. This has the further advantage of this now being straight-through code with standard control flow, instead of the unusual inversion of control we were doing before bouncing in and out of different Execute and DynamicExpand implementations to get this done.
-
Martin Atkins authored
We were previously _trying_ to handle diagnostics here but were not quite doing it right because we were testing whether the resulting error was nil rather than appending it to the diagnostics and then seeing if the result has errors. The difference here is important because it allows DynamicExpand to return warnings without associated errors when needed. Previously the graph walker would treat a warnings-only result as if it were an error. Ideally we'd change DynamicExpand to return diagnostics directly, but we previously decided against that because there were so many implementors to update, and my intent for this change is to be surgical in the update so we minimize risk of backporting the change into patch releases.
-
James Bardin authored
RemovePlannedResourceInstanceObjects during import
-
James Bardin authored
prune unused nodes from a destroy plan graph
-
James Bardin authored
prevent cycles when connecting destroy nodes
-
James Bardin authored
When adding destroy edges between resources from different providers, and a provider itself depends on the other provider's resources, we can get cycles in the final dependency graph. The problem is a little deeper than simply not connecting these nodes, since the edges are still needed when doing a full destroy operation. For now we can get by assuming the edges are required, and reverting them only if they result in a cycle. This works because destroy edges are the last edges added to managed resources during graph building. This was rarely a problem before v1.3, because noop nodes were not added to the apply graph, and unused values were aggressively pruned. In v1.3 however all nodes are kept in the graph so that postcondition blocks are always evaluated during apply, increasing the chances of the cycles appearing.
-
- 25 Sep, 2022 1 commit
-
-
James Bardin authored
Because import uses the complete planning process, it must also call RemovePlannedResourceInstanceObjects. This is required to serialized the resulting state if there are data sources with an ObjectPlanned status because they could not be read during the import process.
-
- 23 Sep, 2022 11 commits
-
-
Laura Pacilio authored
Update workspace documentation
-
Laura Pacilio authored
-
Laura Pacilio authored
-
Laura Pacilio authored
-
Laura Pacilio authored
-
Laura Pacilio authored
-
James Bardin authored
We may need to prune nodes from a full destroy plan graph which cannot be evaluated if there is no current state. Add missing method to nodeExpandPlannableResource to ensure planned resource are handled correctly when pruning nodes.
-
UKEME BASSEY authored
omit sensitive output values in logs from terraform apply json command
-
Alisdair McDiarmid authored
Upgrade hcl to fix crash with optional attributes
-
Alisdair McDiarmid authored
Also add regression test coverage of the crash. This would occur when objects with optional attributes had default values of different type from the attribute type, and the objects were members of a collection. For example: list(object({ a = optional(set(string), []) })) If this type constraint is applied to a variable value where one object has a set(string) value for a, and the other object applies the empty tuple default, Terraform would crash.
-
Matthew Garrell authored
insert missing infinitive particle
-
- 22 Sep, 2022 8 commits
-
-
Laura Pacilio authored
-
Laura Pacilio authored
-
Laura Pacilio authored
-
Laura Pacilio authored
-
UKEME BASSEY authored
-
Alisdair McDiarmid authored
Add initial pull request template
-
Alisdair McDiarmid authored
-
Craig Wright authored
fixed typo: `startsswith` -> `startswith`
-
- 21 Sep, 2022 2 commits
-
-
koki-develop authored
-
Alisdair McDiarmid authored
Update main branch version to 1.4.0
-