cloud-platform-infrastructure
cloud-platform-infrastructure copied to clipboard
chore(deps): bump the cloud-platform-aws-account group across 1 directory with 9 updates
Bumps the cloud-platform-aws-account group with 9 updates in the /terraform/aws-accounts/cloud-platform-aws/account directory:
Package | From | To |
---|---|---|
auth0/auth0 | 0.50.2 |
1.4.0 |
ecr::cloud-platform-terraform-ecr-credentials | 6.1.0 |
7.0.0 |
ecr_credentials::cloud-platform-terraform-ecr-credentials | 6.1.0 |
7.0.0 |
hashicorp/aws | 5.31.0 |
5.61.0 |
hashicorp/http | 3.4.2 |
3.4.4 |
integrations/github | 5.42.0 |
6.2.3 |
opensearch-project/opensearch | 2.2.1 |
2.3.0 |
terraform-aws-modules/acm/aws | 5.0.0 |
5.0.1 |
terraform-aws-modules/s3-bucket/aws | 2.14.0 |
4.1.2 |
Updates auth0/auth0
from 0.50.2 to 1.4.0
Release notes
Sourced from auth0/auth0's releases.
v1.4.0
FEATURES:
resource/auth0_connection_scim_configuration
: Add a resource for managing SCIM(System for Cross-domain Identity Management) configuration. (#980)resource/auth0_prompt_custom_text
: Add new prompt values (captcha
,custom-form
,customized-consent
,passkeys
,phone-identifier-challenge
,phone-identifier-enrollment
) to theauth0_prompt_custom_text
resource. (#985)data-source/auth0_connection_scim_configuration
: Add a data source for managing SCIM(System for Cross-domain Identity Management) configuration. (#980)ENHANCEMENTS:
resource/auth0_tenant
: Add support forenable_sso
flag (#972)NOTES:
resource/auth0_tenant
: Deprecated therequire-pushed-authorization-requests
attribute. (#986)v1.3.0
FEATURES:
resource/auth0_connection
: Add support foris_signup_enabled
to support configuring sign-ups with Organization Membership (#974)resource/auth0_connection
: Add support forshow_as_button
to allow the button to be disabled in Organization Enterprise connections (#974)resource/auth0_resource_server
: Add Support forrfc9068_profile
andrfc9068_profile_authz
Token Dialects in Resource Server Configurationdata-source/auth0_organization
: Addis_signup_enabled
toconnections
to indicate if sign-ups with Organization Membership are enabled (#974)data-source/auth0_organization
: Addshow_as_button
toconnections
to indicatate if button is disabled in Organization Enterprise connections (#974) (#973)v1.2.1
ENHANCEMENTS:
- Switched from
offset pagination
tocheckpoint pagination
when listingorganizations/members
to remove the 1000 result limit (#965)BUG FIXES:
resource/auth0_organization_member
: Resolve an issue where organization members were searched among a limited paginated result (#964)NOTES:
resource/auth0_role_permission
: Improved documentation by adding resource config and import examples (#963)resource/auth0_role_permissions
: Improved documentation by adding resource config and import examples (#963)v1.2.0
FEATURES:
resource/auth0_prompt_partials
: Add new resource to manage prompt partials (#918)v1.1.2
ENHANCEMENTS:
resource/auth0_action
: Prevent sendingsecrets
anddependencies
config if no changes triggered (#903)BUG FIXES:
... (truncated)
Changelog
Sourced from auth0/auth0's changelog.
v1.4.0
FEATURES:
resource/auth0_connection_scim_configuration
: Add a resource for managing SCIM(System for Cross-domain Identity Management) configuration. (#980)resource/auth0_prompt_custom_text
: Add new prompt values (captcha
,custom-form
,customized-consent
,passkeys
,phone-identifier-challenge
,phone-identifier-enrollment
) to theauth0_prompt_custom_text
resource. (#985)data-source/auth0_connection_scim_configuration
: Add a data source for managing SCIM(System for Cross-domain Identity Management) configuration. (#980)ENHANCEMENTS:
resource/auth0_tenant
: Add support forenable_sso
flag (#972)NOTES:
resource/auth0_tenant
: Deprecated therequire-pushed-authorization-requests
attribute. (#986)v1.3.0
FEATURES:
resource/auth0_connection
: Add support foris_signup_enabled
to support configuring sign-ups with Organization Membership (#974)resource/auth0_connection
: Add support forshow_as_button
to allow the button to be disabled in Organization Enterprise connections (#974)resource/auth0_resource_server
: Add Support forrfc9068_profile
andrfc9068_profile_authz
Token Dialects in Resource Server Configurationdata-source/auth0_organization
: Addis_signup_enabled
toconnections
to indicate if sign-ups with Organization Membership are enabled (#974)data-source/auth0_organization
: Addshow_as_button
toconnections
to indicatate if button is disabled in Organization Enterprise connections (#974) (#973)v1.2.1
ENHANCEMENTS:
- Switched from
offset pagination
tocheckpoint pagination
when listingorganizations/members
to remove the 1000 result limit (#965)BUG FIXES:
resource/auth0_organization_member
: Resolve an issue where organization members were searched among a limited paginated result (#964)NOTES:
resource/auth0_role_permission
: Improved documentation by adding resource config and import examples (#963)resource/auth0_role_permissions
: Improved documentation by adding resource config and import examples (#963)v1.2.0
FEATURES:
resource/auth0_prompt_partials
: Add new resource to manage prompt partials (#918)v1.1.2
... (truncated)
Commits
5122236
Fix changelog for v1.4.0 (#989)c7ad4ee
Add changelog for v1.4.0 (#988)946909b
Add terraform provider support for new SCIM server api2 endpoints (#980)e3a495d
Reintroduce and Deprecaterequire_pushed_authorization_requests
Flag to Avo...469b9cc
Addenable_sso
and Removerequire_pushed_authorization_requests
flag supp...867a976
Add New Prompt Values toauth0_prompt_custom_text
Resource (#985)8b89642
Bump github.com/auth0/go-auth0 from 1.7.0 to 1.8.0 (#984)28a70ef
Bump github.com/hashicorp/terraform-plugin-testing from 1.8.0 to 1.9.0 (#983)f9d1726
Bump google.golang.org/grpc from 1.64.0 to 1.64.1 (#982)e88bc9d
Pinned the goreleaser version to 1.26.2 (#977)- Additional commits viewable in compare view
Updates ecr::cloud-platform-terraform-ecr-credentials
from 6.1.0 to 7.0.0
Release notes
Sourced from ecr::cloud-platform-terraform-ecr-credentials's releases.
v7.0.0
What's Changed
- Update example to use the latest release by
@poornima-krishnasamy
in ministryofjustice/cloud-platform-terraform-ecr-credentials#103- Repo vars condition by
@sj-williams
in ministryofjustice/cloud-platform-terraform-ecr-credentials#109Full Changelog: https://github.com/ministryofjustice/cloud-platform-terraform-ecr-credentials/compare/6.1.1...7.0.0
Breaking Changes
Headline: If optional
github_environments
field is set, any pre-existing default repository ECR secrets and variables will be deleted.This release introduces functionality that could potentially break some existing GitHub Actions pipelines that utilise GitHub Secrets and Variables. Please read this guidance thoroughly and check that your GitHub Actions workflows are configured correctly.
Action required
If you’re using the ECR module in your environment, and are not setting the optional
github_environments
field, then this7.0.0
update will have no impact on your CI/CD workflows and you can ignore this guidance.If you are setting the
github_environments
field, then you should be accessing your ECR secrets and variables:
ECR_ROLE_TO_ASSUME
ECR_REGION
ECR_REPOSITORY
(these will vary if you are settinggithub_actions_prefix
in your module call)from your own defined GitHub environments within your repository workflows. This can be verified by reviewing your GitHub Actions yaml ECR build configurations and verifying that your ECR secrets and variables are scoped within an
environment
block, similar to the below workflow snippet:on: push: branches: [main]
jobs: ecr: environment: development # <-- Your environment name here runs-on: ubuntu-latest ... ... steps: ... # Assume role in Cloud Platform - uses: aws-actions/configure-aws-credentials@v2 with: role-to-assume: ${{ secrets.ECR_ROLE_TO_ASSUME }} # <-- environment scoped secret aws-region: ${{ vars.ECR_REGION }} # <-- environment scoped variable
... (truncated)
Commits
6e9c083
Merge pull request #109 from ministryofjustice/repo-vars-conditionb09aa1e
readme update79ccaaf
readme update073f0e3
set repo vars resource creation dependency on environments list0b52bb9
Merge pull request #103 from ministryofjustice/ecr-example-014a5633d
Update example to use the latest release0386403
Merge pull request #101 from ministryofjustice/tf-validation2dc4c13
feat(action): add setup go to pipeline5915061
feat(action): add action for unit test115f8bd
feat(Go): add unit tests for validation of tf- Additional commits viewable in compare view
Updates ecr_credentials::cloud-platform-terraform-ecr-credentials
from 6.1.0 to 7.0.0
Release notes
Sourced from ecr_credentials::cloud-platform-terraform-ecr-credentials's releases.
v7.0.0
What's Changed
- Update example to use the latest release by
@poornima-krishnasamy
in ministryofjustice/cloud-platform-terraform-ecr-credentials#103- Repo vars condition by
@sj-williams
in ministryofjustice/cloud-platform-terraform-ecr-credentials#109Full Changelog: https://github.com/ministryofjustice/cloud-platform-terraform-ecr-credentials/compare/6.1.1...7.0.0
Breaking Changes
Headline: If optional
github_environments
field is set, any pre-existing default repository ECR secrets and variables will be deleted.This release introduces functionality that could potentially break some existing GitHub Actions pipelines that utilise GitHub Secrets and Variables. Please read this guidance thoroughly and check that your GitHub Actions workflows are configured correctly.
Action required
If you’re using the ECR module in your environment, and are not setting the optional
github_environments
field, then this7.0.0
update will have no impact on your CI/CD workflows and you can ignore this guidance.If you are setting the
github_environments
field, then you should be accessing your ECR secrets and variables:
ECR_ROLE_TO_ASSUME
ECR_REGION
ECR_REPOSITORY
(these will vary if you are settinggithub_actions_prefix
in your module call)from your own defined GitHub environments within your repository workflows. This can be verified by reviewing your GitHub Actions yaml ECR build configurations and verifying that your ECR secrets and variables are scoped within an
environment
block, similar to the below workflow snippet:on: push: branches: [main]
jobs: ecr: environment: development # <-- Your environment name here runs-on: ubuntu-latest ... ... steps: ... # Assume role in Cloud Platform - uses: aws-actions/configure-aws-credentials@v2 with: role-to-assume: ${{ secrets.ECR_ROLE_TO_ASSUME }} # <-- environment scoped secret aws-region: ${{ vars.ECR_REGION }} # <-- environment scoped variable
... (truncated)
Commits
6e9c083
Merge pull request #109 from ministryofjustice/repo-vars-conditionb09aa1e
readme update79ccaaf
readme update073f0e3
set repo vars resource creation dependency on environments list0b52bb9
Merge pull request #103 from ministryofjustice/ecr-example-014a5633d
Update example to use the latest release0386403
Merge pull request #101 from ministryofjustice/tf-validation2dc4c13
feat(action): add setup go to pipeline5915061
feat(action): add action for unit test115f8bd
feat(Go): add unit tests for validation of tf- Additional commits viewable in compare view
Updates hashicorp/aws
from 5.31.0 to 5.61.0
Release notes
Sourced from hashicorp/aws's releases.
v5.61.0
NOTES:
- resource/aws_chatbot_teams_channel_configuration: This resource is provided on a best-effort basis, and we welcome the community's help in testing it. (#38630)
FEATURES:
- New Data Source:
aws_ecr_repository_creation_template
(#38597)- New Resource:
aws_chatbot_slack_channel_configuration
(#38124)- New Resource:
aws_chatbot_teams_channel_configuration
(#38630)- New Resource:
aws_datazone_glossary
(#38602)- New Resource:
aws_ecr_repository_creation_template
(#38597)- New Resource:
aws_timestreaminfluxdb_db_instance
(#37963)ENHANCEMENTS:
- data-source/aws_eks_cluster: Add
upgrade_policy
attribute (#38573)- data-source/aws_sagemaker_prebuilt_ecr_image: Support additional
repository_name
values. See documentation for details (#38575)- resource/aws_appsync_graphql_api: Add
enhanced_metrics_config
configuration block (#38570)- resource/aws_db_instance: Add
upgrade_storage_config
argument (#36904)- resource/aws_default_vpc: Support
ipv6_cidr_block
sizes between/44
and/60
in increments of /4 (#35614)- resource/aws_default_vpc: Support
ipv6_netmask_length
values between44
and60
in increments of 4 (#35614)- resource/aws_eks_cluster: Add
upgrade_policy
configuration block (#38573)- resource/aws_elasticache_user_group_association: Add configurable create and delete timeouts (#38559)
- resource/aws_pipes_pipe: Add
log_configuration.include_execution_data
argument (#38569)- resource/aws_rds_cluster: Add
performance_insights_enabled
,performance_insights_kms_key_id
, andperformance_insights_retention_period
arguments (#29415)- resource/aws_rds_cluster: Add
restore_to_point_in_time.source_cluster_resource_id
argument (#38540)- resource/aws_rds_cluster: Mark
restore_to_point_in_time.source_cluster_identifier
as Optional (#38540)- resource/aws_sfn_activity: Add
encryption_configuration
configuration block to support the use of Customer Managed Keys with AWS KMS to encrypt Step Functions Activity resources (#38574)- resource/aws_sfn_state_machine: Add
encryption_configuration
configuration block to support the use of Customer Managed Keys with AWS KMS to encrypt Step Functions State Machine resources (#38574)- resource/aws_ssm_patch_baseline: Remove empty fields from
json
attribute value (#35950)- resource/aws_storagegateway_file_system_association: Add configurable timeouts (#38554)
- resource/aws_vpc: Support
ipv6_cidr_block
sizes between/44
and/60
in increments of /4 (#35614)- resource/aws_vpc: Support
ipv6_netmask_length
values between44
and60
in increments of 4 (#35614)- resource/aws_vpc_ipv6_cidr_block_association: Add
assign_generated_ipv6_cidr_block
andipv6_pool
arguments (#27274)- resource/aws_vpc_ipv6_cidr_block_association: Support
ipv6_cidr_block
sizes between/44
and/60
in increments of /4 (#35614)- resource/aws_vpc_ipv6_cidr_block_association: Support
ipv6_netmask_length
values between44
and60
in increments of 4 (#35614)- resource/aws_vpc_security_group_egress_rule: Add
tags
to theAuthorizeSecurityGroupEgress
EC2 API call instead of making a separateCreateTags
call (#35614)- resource/aws_vpc_security_group_ingress_rule: Add
tags
to theAuthorizeSecurityGroupIngress
EC2 API call instead of making a separateCreateTags
call (#35614)- resource/aws_wafv2_web_acl: Add
rule_json
attribute to allow raw JSON for rules. (#38309)BUG FIXES:
- data-source/aws_appstream_image: Fix issue where the most recent image is not returned (#38571)
- datasource/aws_networkmanager_core_network_policy_document: Fix
CoreNetworkPolicyException
when putting policy with single wildcard inwhen_sent_to
(#38595)- resource/aws_cloudsearch_domain: Fix
index_name
character length validation (#38509)- resource/aws_ecs_task_definition: Ensure that JSON keys in
container_definitions
start with a lowercase letter (#38622)- resource/aws_iot_provisioning_template: Properly send
type
argument on create when configured (#38640)- resource/aws_opensearchserverless_security_policy: Normalize
policy
content to prevent persistent differences (#38604)- resource/aws_pipes_pipe: Don't reset
target_parameters
if the configured value has not changed (#38598)
... (truncated)
Changelog
Sourced from hashicorp/aws's changelog.
5.61.0 (August 1, 2024)
NOTES:
- resource/aws_chatbot_teams_channel_configuration: This resource is provided on a best-effort basis, and we welcome the community's help in testing it. (#38630)
FEATURES:
- New Data Source:
aws_ecr_repository_creation_template
(#38597)- New Resource:
aws_chatbot_slack_channel_configuration
(#38124)- New Resource:
aws_chatbot_teams_channel_configuration
(#38630)- New Resource:
aws_datazone_glossary
(#38602)- New Resource:
aws_ecr_repository_creation_template
(#38597)- New Resource:
aws_timestreaminfluxdb_db_instance
(#37963)ENHANCEMENTS:
- data-source/aws_eks_cluster: Add
upgrade_policy
attribute (#38573)- data-source/aws_sagemaker_prebuilt_ecr_image: Support additional
repository_name
values. See documentation for details (#38575)- resource/aws_appsync_graphql_api: Add
enhanced_metrics_config
configuration block (#38570)- resource/aws_db_instance: Add
upgrade_storage_config
argument (#36904)- resource/aws_default_vpc: Support
ipv6_cidr_block
sizes between/44
and/60
in increments of /4 (#35614)- resource/aws_default_vpc: Support
ipv6_netmask_length
values between44
and60
in increments of 4 (#35614)- resource/aws_eks_cluster: Add
upgrade_policy
configuration block (#38573)- resource/aws_elasticache_user_group_association: Add configurable create and delete timeouts (#38559)
- resource/aws_pipes_pipe: Add
log_configuration.include_execution_data
argument (#38569)- resource/aws_rds_cluster: Add
performance_insights_enabled
,performance_insights_kms_key_id
, andperformance_insights_retention_period
arguments (#29415)- resource/aws_rds_cluster: Add
restore_to_point_in_time.source_cluster_resource_id
argument (#38540)- resource/aws_rds_cluster: Mark
restore_to_point_in_time.source_cluster_identifier
as Optional (#38540)- resource/aws_sfn_activity: Add
encryption_configuration
configuration block to support the use of Customer Managed Keys with AWS KMS to encrypt Step Functions Activity resources (#38574)- resource/aws_sfn_state_machine: Add
encryption_configuration
configuration block to support the use of Customer Managed Keys with AWS KMS to encrypt Step Functions State Machine resources (#38574)- resource/aws_ssm_patch_baseline: Remove empty fields from
json
attribute value (#35950)- resource/aws_storagegateway_file_system_association: Add configurable timeouts (#38554)
- resource/aws_vpc: Support
ipv6_cidr_block
sizes between/44
and/60
in increments of /4 (#35614)- resource/aws_vpc: Support
ipv6_netmask_length
values between44
and60
in increments of 4 (#35614)- resource/aws_vpc_ipv6_cidr_block_association: Add
assign_generated_ipv6_cidr_block
andipv6_pool
arguments (#27274)- resource/aws_vpc_ipv6_cidr_block_association: Support
ipv6_cidr_block
sizes between/44
and/60
in increments of /4 (#35614)- resource/aws_vpc_ipv6_cidr_block_association: Support
ipv6_netmask_length
values between44
and60
in increments of 4 (#35614)- resource/aws_vpc_security_group_egress_rule: Add
tags
to theAuthorizeSecurityGroupEgress
EC2 API call instead of making a separateCreateTags
call (#35614)- resource/aws_vpc_security_group_ingress_rule: Add
tags
to theAuthorizeSecurityGroupIngress
EC2 API call instead of making a separateCreateTags
call (#35614)- resource/aws_wafv2_web_acl: Add
rule_json
attribute to allow raw JSON for rules. (#38309)BUG FIXES:
- data-source/aws_appstream_image: Fix issue where the most recent image is not returned (#38571)
- datasource/aws_networkmanager_core_network_policy_document: Fix
CoreNetworkPolicyException
when putting policy with single wildcard inwhen_sent_to
(#38595)- resource/aws_cloudsearch_domain: Fix
index_name
character length validation (#38509)- resource/aws_ecs_task_definition: Ensure that JSON keys in
container_definitions
start with a lowercase letter (#38622)- resource/aws_iot_provisioning_template: Properly send
type
argument on create when configured (#38640)- resource/aws_opensearchserverless_security_policy: Normalize
policy
content to prevent persistent differences (#38604)
... (truncated)
Commits
534f273
Update CHANGELOG.md for #38309153d847
Merge pull request #38309 from hashicorp/f-wafv2_acl_rule220214f
Merge pull request #38602 from hashicorp/f/datazone-glossary-resource17ce18a
Test cleanup 29c9dcbc
Update CHANGELOG.md for #38648e5c138c
Merge pull request #38648 from hashicorp/t-go-modac3df3f
Merge pull request #38547 from felipempda/b-aws_sagemaker_domain-missingRStud...e461f53
r/aws_wafv2_web_acl(test): cases for rule_json expanderb2c3e80
r/aws_wafv2_web_acl: error when rule_json contains zero value rule6a3b189
go mod tidy- Additional commits viewable in compare view
Updates hashicorp/http
from 3.4.2 to 3.4.4
Release notes
Sourced from hashicorp/http's releases.
v3.4.4
NOTES:
- data-source/http: Previous versions of this provider ignored any
Host
headers specified in therequest_headers
attribute when setting the HTTP request. Any specifiedHost
request header will now be set on the HTTP request.For example, in the following configuration:
data "http" "example" { url = "https://www.example.com" request_headers = { Host = "www.differentexample.com" } }
The HTTP request URL host is still
www.example.com
but the HTTP requestHost
header will now bewww.differentexample.com
instead ofwww.example.com
. (#440)BUG FIXES:
- data-source/http: Allow
Host
header inrequest_headers
to be set on HTTP request (#440)v3.4.3
BUG FIXES:
- data-source/http: Avoid potentially leaking URL-embedded basic authentication credentials in logs and error messages (#429)
Changelog
Sourced from hashicorp/http's changelog.
3.4.4 (July 31, 2024)
NOTES:
- data-source/http: Previous versions of this provider ignored any
Host
headers specified in therequest_headers
attribute when setting the HTTP request. Any specifiedHost
request header will now be set on the HTTP request.For example, in the following configuration:
data "http" "example" { url = "https://www.example.com" request_headers = { Host = "www.differentexample.com" } }
The HTTP request URL host is still
www.example.com
but the HTTP requestHost
header will now bewww.differentexample.com
instead ofwww.example.com
. (#440)BUG FIXES:
- data-source/http: Allow
Host
header inrequest_headers
to be set on HTTP request (#440)3.4.3 (June 03, 2024)
BUG FIXES:
- data-source/http: Avoid potentially leaking URL-embedded basic authentication credentials in logs and error messages (#429)
Commits
25bea2d
Update changelog270412b
Clarify HTTPHost
header changelog wording and make header check case-insen...fb5fd5a
AllowHost
request header to override the http request host (#440)ec7c3b8
Result of tsccr-helper -log-level=info gha update -latest . (#442)eb6e2b0
Result of tsccr-helper -log-level=info gha update -latest . (#441)6cfce64
build(deps): bump github.com/hashicorp/terraform-plugin-framework-validators ...c0493ab
build(deps): bump github.com/hashicorp/terraform-plugin-testing (#438)a95fd56
build(deps): bump github.com/hashicorp/terraform-plugin-framework (#439)4aaccd4
build(deps): bump golang.org/x/net from 0.26.0 to 0.27.0 (#436)29bc4eb
build(deps): bump github.com/hashicorp/copywrite in /tools (#435)- Additional commits viewable in compare view
Updates integrations/github
from 5.42.0 to 6.2.3
Release notes
Sourced from integrations/github's releases.
v6.2.3
What's Changed
🛠️ Maintenance
- build(deps): bump the github-actions group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2303🏷 Other Changes
- fix: Fixing
enterprise_id
import ongithub_enterprise_actions_permissions
by@ErikElkins
in integrations/terraform-provider-github#2274- Bump go-github to v62 + fixes by
@EttoreFoti
in integrations/terraform-provider-github#2304- docs: mark enterprise runner visibility required by
@gustavlasko
in integrations/terraform-provider-github#2278New Contributors
@gustavlasko
made their first contribution in integrations/terraform-provider-github#2278Full Changelog: https://github.com/integrations/terraform-provider-github/compare/v6.2.2...v6.2.3
v6.2.2
What's Changed
🛠️ Maintenance
- build(deps): bump actions/add-to-project from 0.6.1 to 1.0.0 by
@dependabot
in integrations/terraform-provider-github#2215- build(deps): bump github.com/golangci/golangci-lint from 1.57.1 to 1.57.2 by
@dependabot
in integrations/terraform-provider-github#2216- build(deps): bump the github-actions group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2218- build(deps): bump github/codeql-action from 3.24.9 to 3.24.10 in the github-actions group by
@dependabot
in integrations/terraform-provider-github#2221- build(deps): bump the gomod group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2220- build(deps): bump actions/add-to-project from 1.0.0 to 1.0.1 in the github-actions group by
@dependabot
in integrations/terraform-provider-github#2231- build(deps): bump golang.org/x/net from 0.22.0 to 0.23.0 by
@dependabot
in integrations/terraform-provider-github#2234- build(deps): bump the github-actions group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2238- build(deps): bump the github-actions group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2244- build(deps): bump the gomod group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2257- build(deps): bump actions/setup-go from 5.0.0 to 5.0.1 in the github-actions group by
@dependabot
in integrations/terraform-provider-github#2256- build(deps): bump the github-actions group with 3 updates by
@dependabot
in integrations/terraform-provider-github#2259- build(deps): bump the gomod group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2260- build(deps): bump the github-actions group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2268- build(deps): bump github/codeql-action from 3.25.5 to 3.25.6 in the github-actions group by
@dependabot
in integrations/terraform-provider-github#2272- build(deps): bump the gomod group across 1 directory with 2 updates by
@dependabot
in integrations/terraform-provider-github#2271- 🚧 Workflows have changed by
@octokitbot
in integrations/terraform-provider-github#2281- build(deps): bump the gomod group with 3 updates by
@dependabot
in integrations/terraform-provider-github#2287- build(deps): bump github/codeql-action from 3.25.6 to 3.25.8 in the github-actions group across 1 directory by
@dependabot
in integrations/terraform-provider-github#2286- build(deps): bump the github-actions group with 2 updates by
@dependabot
in integrations/terraform-provider-github#2292- build(deps): bump goreleaser/goreleaser-action from 5.1.0 to 6.0.0 by
@dependabot
in integrations/terraform-provider-github#2293🏷 Other Changes
- chore: Refactored tooling for best practices by
@stevehipwell
in integrations/terraform-provider-github#2193- changed logic on repositories_detailed by
@n47h4n12
in integrations/terraform-provider-github#2248- improve documentation for
github_repository
by@garysassano
in integrations/terraform-provider-github#2265- docs: update title and code highlighting for github_repository_ruleset by
@stefanfreitag
in integrations/terraform-provider-github#2285- docs: add missing quote in branch protection v3 example by
@stefanfreitag
in integrations/terraform-provider-github#2283- Goreleaser deprecation: skip --> disable by
@kfcampbell
in integrations/terraform-provider-github#2294
... (truncated)
Commits
782d71f
docs: mark enterprise runner visibility required (#2278)d3784bd
Bump go-github to v62 + fixes (#2304)99d1937
build(deps): bump the github-actions group with 2 updates (#2303)2a17feb
Fixing enterprise id reference (#2274)5ce4588
build(deps): bump goreleaser/goreleaser-action from 5.1.0 to 6.0.0 (#2293)aa7f68a
goreleaser deprecation: skip --> disable (#2294)33787a9
build(deps): bump the github-actions group with 2 updates (#2292)01239e8
docs: add missing quote in branch protection v3 example (#2283)350d8f0
docs: update title and code highlighting for github_repository_ruleset (#2285)aa07277
improve documentation forgithub_repository
(#2265)- Additional commits viewable in compare view
Updates opensearch-project/opensearch
from 2.2.1 to 2.3.0
Release notes
Sourced from opensearch-project/opensearch's releases.
v2.3.0
What's Changed
- Fix serverl...
Description has been truncated