This project is mirrored from https://:*****@github.com/hashicorp/terraform.git.
Pull mirroring failed .
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
Repository mirroring has been paused due to too many failed attempts. It can be resumed by a project maintainer.
- 19 Apr, 2022 2 commits
-
-
tombuildsstuff authored
-
tombuildsstuff authored
Fixes #30881
-
- 15 Apr, 2022 4 commits
-
-
Brandon Croft authored
fix(creds): allow periods in TF_TOKEN_... credentials vars
-
Brandon Croft authored
-
Martin Atkins authored
-
Brandon Croft authored
-
- 14 Apr, 2022 7 commits
-
-
Kevin Wang authored
-
Radek Simko authored
-
Brandon Croft authored
test(cloud): ensure mocks are used for backend configure tests
-
Radek Simko authored
* internal/getproviders: Add URL to error message for clarity Occasionally `terraform init` on some providers may return the following error message: Error while installing citrix/citrixadc v1.13.0: could not query provider registry for registry.terraform.io/citrix/citrixadc: failed to retrieve authentication checksums for provider: 403 Forbidden The 403 is most often returned from GitHub (rather than Registry API) and this change makes it more obvious. * Use Host instead of full URL
-
Laura Pacilio authored
docs: Fix typo in v1.0 upgrade guide
-
James Bardin authored
remove the use of data source prior state from planning
-
James Bardin authored
data schema changes may prevent state decoding
-
- 13 Apr, 2022 14 commits
-
-
Shanee D authored
-
Sebastian Rivera authored
Cloud e2e tests for configuring `cloud` with env vars
-
Brandon Croft authored
Allow remote service creds to be configured using env
-
Brandon Croft authored
-
Brandon Croft authored
Co-authored-by:
Laura Pacilio <83350965+laurapacilio@users.noreply.github.com>
-
Brandon Croft authored
Hyphen characters are allowed in environment variable names, but are not valid POSIX variable names. Usually, it's still possible to set variable names with hyphens using utilities like env or docker. But, as a fallback, host names may encode their hyphens as double underscores in the variable name. For the example "café.fr", the variable name "TF_TOKEN_xn____caf__dma_fr" or "TF_TOKEN_xn--caf-dma_fr" may be used.
-
Brandon Croft authored
Co-authored-by:
Laura Pacilio <83350965+laurapacilio@users.noreply.github.com>
-
Brandon Croft authored
Introduces a new method of configuring token service credentials using a host-specific environment variable. This configuration was previously possible using the [terraform-credentials-env](https://github.com/apparentlymart/terraform-credentials-env) credentials helper. This new method is now consulted first, as it is seen to be the most proximate source of credentials before CLI configuration while still falling back to the credentials helper.
-
Alisdair McDiarmid authored
cli: Fix double-quoted map keys in diff UI
-
hc-github-team-tf-core authored
-
hc-github-team-tf-core authored
-
Brandon Croft authored
-
Brandon Croft authored
Also adds a few new tests for cloud configuration using environment variables
-
Alisdair McDiarmid authored
A previous change added missing quoting around object keys which do not parse as barewords. At the same time we introduced a bug where map keys could be double-quoted, due to calling the `displayAttributeName` helper function (to quote non-bareword keys) then using the `writeValue` method (which quotes all strings). This commit fixes this and adds test coverage for map keys which require quoting.
-
- 12 Apr, 2022 2 commits
-
-
Sebastian Rivera authored
-
Kevin Wang authored
- follows: https://github.com/hashicorp/terraform-cdk/pull/1611
-
- 11 Apr, 2022 10 commits
-
-
Sebastian Rivera authored
-
Sebastian Rivera authored
Add cloud config support for TF_WORKSPACE
-
Sebastian Rivera authored
Co-authored-by:
Laura Pacilio <83350965+laurapacilio@users.noreply.github.com>
-
Sebastian Rivera authored
-
Sebastian Rivera authored
-
James Bardin authored
Data sources should not require reading the previous versions. While we previously skipped the decoding if it were to fail, this removes the need for any prior state at all. The only place where the prior state was functionally used was in the destroy path. Because a data source destroy is only for cleanup purposes to clean out the state using the same code paths as a managed resource, we can substitute the prior state in the change change with a null value to maintain the same behavior.
-
James Bardin authored
After data source handling was moved from a separate refresh phase into the planning phase, reading the existing state was only used for informational purposes. This had been reduced to reporting warnings when the provider returned an unexpected value to try and help locate legacy provider bugs, but any actual issues located from those warnings were very few and far between. Because the prior state cannot be reliably decoded when faced with incompatible provider schema upgrades, and there is no longer any significant reason to try and get the prior state at all, we can skip the process entirely.
-
James Bardin authored
-
James Bardin authored
Data sources do not have state migrations, so there may be no way to decode the prior state when faced with incompatible type changes. Because prior state is only informational to the plan, and its existence should not effect the planning process, we can skip decoding when faced with errors.
-
Alisdair McDiarmid authored
cli: Fix plan diff for sensitive nested attributes
-
- 08 Apr, 2022 1 commit
-
-
Alisdair McDiarmid authored
When rendering diffs for resources which use nested attribute types, we must cope with collections backing those attributes which are entirely sensitive. The most common way this will be seen is through sensitive values being present in sets, which will result in the entire set being marked sensitive.
-