cloud-platform-infrastructure icon indicating copy to clipboard operation
cloud-platform-infrastructure copied to clipboard

chore(deps): bump the cloud-platform-aws-account group across 1 directory with 9 updates

Open dependabot[bot] opened this issue 6 months ago • 0 comments

Bumps the cloud-platform-aws-account group with 9 updates in the /terraform/aws-accounts/cloud-platform-aws/account directory:

Package From To
auth0/auth0 0.50.2 1.4.0
ecr::cloud-platform-terraform-ecr-credentials 6.1.0 7.0.0
ecr_credentials::cloud-platform-terraform-ecr-credentials 6.1.0 7.0.0
hashicorp/aws 5.31.0 5.61.0
hashicorp/http 3.4.2 3.4.4
integrations/github 5.42.0 6.2.3
opensearch-project/opensearch 2.2.1 2.3.0
terraform-aws-modules/acm/aws 5.0.0 5.0.1
terraform-aws-modules/s3-bucket/aws 2.14.0 4.1.2

Updates auth0/auth0 from 0.50.2 to 1.4.0

Release notes

Sourced from auth0/auth0's releases.

v1.4.0

FEATURES:

  • resource/auth0_connection_scim_configuration: Add a resource for managing SCIM(System for Cross-domain Identity Management) configuration. (#980)
  • resource/auth0_prompt_custom_text: Add new prompt values (captcha, custom-form, customized-consent, passkeys, phone-identifier-challenge, phone-identifier-enrollment) to the auth0_prompt_custom_text resource. (#985)
  • data-source/auth0_connection_scim_configuration: Add a data source for managing SCIM(System for Cross-domain Identity Management) configuration. (#980)

ENHANCEMENTS:

  • resource/auth0_tenant: Add support for enable_sso flag (#972)

NOTES:

  • resource/auth0_tenant: Deprecated the require-pushed-authorization-requests attribute. (#986)

v1.3.0

FEATURES:

  • resource/auth0_connection: Add support for is_signup_enabled to support configuring sign-ups with Organization Membership (#974)
  • resource/auth0_connection: Add support for show_as_button to allow the button to be disabled in Organization Enterprise connections (#974)
  • resource/auth0_resource_server: Add Support for rfc9068_profile and rfc9068_profile_authz Token Dialects in Resource Server Configuration
  • data-source/auth0_organization: Add is_signup_enabled to connections to indicate if sign-ups with Organization Membership are enabled (#974)
  • data-source/auth0_organization: Add show_as_button to connections to indicatate if button is disabled in Organization Enterprise connections (#974) (#973)

v1.2.1

ENHANCEMENTS:

  • Switched from offset pagination to checkpoint pagination when listing organizations/members to remove the 1000 result limit (#965)

BUG FIXES:

  • resource/auth0_organization_member: Resolve an issue where organization members were searched among a limited paginated result (#964)

NOTES:

  • resource/auth0_role_permission: Improved documentation by adding resource config and import examples (#963)
  • resource/auth0_role_permissions: Improved documentation by adding resource config and import examples (#963)

v1.2.0

FEATURES:

  • resource/auth0_prompt_partials: Add new resource to manage prompt partials (#918)

v1.1.2

ENHANCEMENTS:

  • resource/auth0_action: Prevent sending secrets and dependencies config if no changes triggered (#903)

BUG FIXES:

... (truncated)

Changelog

Sourced from auth0/auth0's changelog.

v1.4.0

FEATURES:

  • resource/auth0_connection_scim_configuration: Add a resource for managing SCIM(System for Cross-domain Identity Management) configuration. (#980)
  • resource/auth0_prompt_custom_text: Add new prompt values (captcha, custom-form, customized-consent, passkeys, phone-identifier-challenge, phone-identifier-enrollment) to the auth0_prompt_custom_text resource. (#985)
  • data-source/auth0_connection_scim_configuration: Add a data source for managing SCIM(System for Cross-domain Identity Management) configuration. (#980)

ENHANCEMENTS:

  • resource/auth0_tenant: Add support for enable_sso flag (#972)

NOTES:

  • resource/auth0_tenant: Deprecated the require-pushed-authorization-requests attribute. (#986)

v1.3.0

FEATURES:

  • resource/auth0_connection: Add support for is_signup_enabled to support configuring sign-ups with Organization Membership (#974)
  • resource/auth0_connection: Add support for show_as_button to allow the button to be disabled in Organization Enterprise connections (#974)
  • resource/auth0_resource_server: Add Support for rfc9068_profile and rfc9068_profile_authz Token Dialects in Resource Server Configuration
  • data-source/auth0_organization: Add is_signup_enabled to connections to indicate if sign-ups with Organization Membership are enabled (#974)
  • data-source/auth0_organization: Add show_as_button to connections to indicatate if button is disabled in Organization Enterprise connections (#974) (#973)

v1.2.1

ENHANCEMENTS:

  • Switched from offset pagination to checkpoint pagination when listing organizations/members to remove the 1000 result limit (#965)

BUG FIXES:

  • resource/auth0_organization_member: Resolve an issue where organization members were searched among a limited paginated result (#964)

NOTES:

  • resource/auth0_role_permission: Improved documentation by adding resource config and import examples (#963)
  • resource/auth0_role_permissions: Improved documentation by adding resource config and import examples (#963)

v1.2.0

FEATURES:

  • resource/auth0_prompt_partials: Add new resource to manage prompt partials (#918)

v1.1.2

... (truncated)

Commits
  • 5122236 Fix changelog for v1.4.0 (#989)
  • c7ad4ee Add changelog for v1.4.0 (#988)
  • 946909b Add terraform provider support for new SCIM server api2 endpoints (#980)
  • e3a495d Reintroduce and Deprecate require_pushed_authorization_requests Flag to Avo...
  • 469b9cc Add enable_sso and Remove require_pushed_authorization_requests flag supp...
  • 867a976 Add New Prompt Values to auth0_prompt_custom_text Resource (#985)
  • 8b89642 Bump github.com/auth0/go-auth0 from 1.7.0 to 1.8.0 (#984)
  • 28a70ef Bump github.com/hashicorp/terraform-plugin-testing from 1.8.0 to 1.9.0 (#983)
  • f9d1726 Bump google.golang.org/grpc from 1.64.0 to 1.64.1 (#982)
  • e88bc9d Pinned the goreleaser version to 1.26.2 (#977)
  • Additional commits viewable in compare view

Updates ecr::cloud-platform-terraform-ecr-credentials from 6.1.0 to 7.0.0

Release notes

Sourced from ecr::cloud-platform-terraform-ecr-credentials's releases.

v7.0.0

What's Changed

Full Changelog: https://github.com/ministryofjustice/cloud-platform-terraform-ecr-credentials/compare/6.1.1...7.0.0

Breaking Changes

Headline: If optional github_environments field is set, any pre-existing default repository ECR secrets and variables will be deleted.

This release introduces functionality that could potentially break some existing GitHub Actions pipelines that utilise GitHub Secrets and Variables. Please read this guidance thoroughly and check that your GitHub Actions workflows are configured correctly.

Action required

If you’re using the ECR module in your environment, and are not setting the optional github_environments field, then this 7.0.0 update will have no impact on your CI/CD workflows and you can ignore this guidance.

If you are setting the github_environments field, then you should be accessing your ECR secrets and variables:

ECR_ROLE_TO_ASSUME ECR_REGION ECR_REPOSITORY
(these will vary if you are setting github_actions_prefix in your module call)

from your own defined GitHub environments within your repository workflows. This can be verified by reviewing your GitHub Actions yaml ECR build configurations and verifying that your ECR secrets and variables are scoped within an environment block, similar to the below workflow snippet:

on:
  push:
    branches: [main]

jobs: ecr: environment: development # <-- Your environment name here runs-on: ubuntu-latest ... ... steps: ... # Assume role in Cloud Platform - uses: aws-actions/configure-aws-credentials@v2 with: role-to-assume: ${{ secrets.ECR_ROLE_TO_ASSUME }} # <-- environment scoped secret aws-region: ${{ vars.ECR_REGION }} # <-- environment scoped variable

... (truncated)

Commits
  • 6e9c083 Merge pull request #109 from ministryofjustice/repo-vars-condition
  • b09aa1e readme update
  • 79ccaaf readme update
  • 073f0e3 set repo vars resource creation dependency on environments list
  • 0b52bb9 Merge pull request #103 from ministryofjustice/ecr-example-01
  • 4a5633d Update example to use the latest release
  • 0386403 Merge pull request #101 from ministryofjustice/tf-validation
  • 2dc4c13 feat(action): add setup go to pipeline
  • 5915061 feat(action): add action for unit test
  • 115f8bd feat(Go): add unit tests for validation of tf
  • Additional commits viewable in compare view

Updates ecr_credentials::cloud-platform-terraform-ecr-credentials from 6.1.0 to 7.0.0

Release notes

Sourced from ecr_credentials::cloud-platform-terraform-ecr-credentials's releases.

v7.0.0

What's Changed

Full Changelog: https://github.com/ministryofjustice/cloud-platform-terraform-ecr-credentials/compare/6.1.1...7.0.0

Breaking Changes

Headline: If optional github_environments field is set, any pre-existing default repository ECR secrets and variables will be deleted.

This release introduces functionality that could potentially break some existing GitHub Actions pipelines that utilise GitHub Secrets and Variables. Please read this guidance thoroughly and check that your GitHub Actions workflows are configured correctly.

Action required

If you’re using the ECR module in your environment, and are not setting the optional github_environments field, then this 7.0.0 update will have no impact on your CI/CD workflows and you can ignore this guidance.

If you are setting the github_environments field, then you should be accessing your ECR secrets and variables:

ECR_ROLE_TO_ASSUME ECR_REGION ECR_REPOSITORY
(these will vary if you are setting github_actions_prefix in your module call)

from your own defined GitHub environments within your repository workflows. This can be verified by reviewing your GitHub Actions yaml ECR build configurations and verifying that your ECR secrets and variables are scoped within an environment block, similar to the below workflow snippet:

on:
  push:
    branches: [main]

jobs: ecr: environment: development # <-- Your environment name here runs-on: ubuntu-latest ... ... steps: ... # Assume role in Cloud Platform - uses: aws-actions/configure-aws-credentials@v2 with: role-to-assume: ${{ secrets.ECR_ROLE_TO_ASSUME }} # <-- environment scoped secret aws-region: ${{ vars.ECR_REGION }} # <-- environment scoped variable

... (truncated)

Commits
  • 6e9c083 Merge pull request #109 from ministryofjustice/repo-vars-condition
  • b09aa1e readme update
  • 79ccaaf readme update
  • 073f0e3 set repo vars resource creation dependency on environments list
  • 0b52bb9 Merge pull request #103 from ministryofjustice/ecr-example-01
  • 4a5633d Update example to use the latest release
  • 0386403 Merge pull request #101 from ministryofjustice/tf-validation
  • 2dc4c13 feat(action): add setup go to pipeline
  • 5915061 feat(action): add action for unit test
  • 115f8bd feat(Go): add unit tests for validation of tf
  • Additional commits viewable in compare view

Updates hashicorp/aws from 5.31.0 to 5.61.0

Release notes

Sourced from hashicorp/aws's releases.

v5.61.0

NOTES:

  • resource/aws_chatbot_teams_channel_configuration: This resource is provided on a best-effort basis, and we welcome the community's help in testing it. (#38630)

FEATURES:

  • New Data Source: aws_ecr_repository_creation_template (#38597)
  • New Resource: aws_chatbot_slack_channel_configuration (#38124)
  • New Resource: aws_chatbot_teams_channel_configuration (#38630)
  • New Resource: aws_datazone_glossary (#38602)
  • New Resource: aws_ecr_repository_creation_template (#38597)
  • New Resource: aws_timestreaminfluxdb_db_instance (#37963)

ENHANCEMENTS:

  • data-source/aws_eks_cluster: Add upgrade_policy attribute (#38573)
  • data-source/aws_sagemaker_prebuilt_ecr_image: Support additional repository_name values. See documentation for details (#38575)
  • resource/aws_appsync_graphql_api: Add enhanced_metrics_config configuration block (#38570)
  • resource/aws_db_instance: Add upgrade_storage_config argument (#36904)
  • resource/aws_default_vpc: Support ipv6_cidr_block sizes between /44 and /60 in increments of /4 (#35614)
  • resource/aws_default_vpc: Support ipv6_netmask_length values between 44 and 60 in increments of 4 (#35614)
  • resource/aws_eks_cluster: Add upgrade_policy configuration block (#38573)
  • resource/aws_elasticache_user_group_association: Add configurable create and delete timeouts (#38559)
  • resource/aws_pipes_pipe: Add log_configuration.include_execution_data argument (#38569)
  • resource/aws_rds_cluster: Add performance_insights_enabled, performance_insights_kms_key_id, and performance_insights_retention_period arguments (#29415)
  • resource/aws_rds_cluster: Add restore_to_point_in_time.source_cluster_resource_id argument (#38540)
  • resource/aws_rds_cluster: Mark restore_to_point_in_time.source_cluster_identifier as Optional (#38540)
  • resource/aws_sfn_activity: Add encryption_configuration configuration block to support the use of Customer Managed Keys with AWS KMS to encrypt Step Functions Activity resources (#38574)
  • resource/aws_sfn_state_machine: Add encryption_configuration configuration block to support the use of Customer Managed Keys with AWS KMS to encrypt Step Functions State Machine resources (#38574)
  • resource/aws_ssm_patch_baseline: Remove empty fields from json attribute value (#35950)
  • resource/aws_storagegateway_file_system_association: Add configurable timeouts (#38554)
  • resource/aws_vpc: Support ipv6_cidr_block sizes between /44 and /60 in increments of /4 (#35614)
  • resource/aws_vpc: Support ipv6_netmask_length values between 44 and 60 in increments of 4 (#35614)
  • resource/aws_vpc_ipv6_cidr_block_association: Add assign_generated_ipv6_cidr_block and ipv6_pool arguments (#27274)
  • resource/aws_vpc_ipv6_cidr_block_association: Support ipv6_cidr_block sizes between /44 and /60 in increments of /4 (#35614)
  • resource/aws_vpc_ipv6_cidr_block_association: Support ipv6_netmask_length values between 44 and 60 in increments of 4 (#35614)
  • resource/aws_vpc_security_group_egress_rule: Add tags to the AuthorizeSecurityGroupEgress EC2 API call instead of making a separate CreateTags call (#35614)
  • resource/aws_vpc_security_group_ingress_rule: Add tags to the AuthorizeSecurityGroupIngress EC2 API call instead of making a separate CreateTags call (#35614)
  • resource/aws_wafv2_web_acl: Add rule_json attribute to allow raw JSON for rules. (#38309)

BUG FIXES:

  • data-source/aws_appstream_image: Fix issue where the most recent image is not returned (#38571)
  • datasource/aws_networkmanager_core_network_policy_document: Fix CoreNetworkPolicyException when putting policy with single wildcard in when_sent_to (#38595)
  • resource/aws_cloudsearch_domain: Fix index_name character length validation (#38509)
  • resource/aws_ecs_task_definition: Ensure that JSON keys in container_definitions start with a lowercase letter (#38622)
  • resource/aws_iot_provisioning_template: Properly send type argument on create when configured (#38640)
  • resource/aws_opensearchserverless_security_policy: Normalize policy content to prevent persistent differences (#38604)
  • resource/aws_pipes_pipe: Don't reset target_parameters if the configured value has not changed (#38598)

... (truncated)

Changelog

Sourced from hashicorp/aws's changelog.

5.61.0 (August 1, 2024)

NOTES:

  • resource/aws_chatbot_teams_channel_configuration: This resource is provided on a best-effort basis, and we welcome the community's help in testing it. (#38630)

FEATURES:

  • New Data Source: aws_ecr_repository_creation_template (#38597)
  • New Resource: aws_chatbot_slack_channel_configuration (#38124)
  • New Resource: aws_chatbot_teams_channel_configuration (#38630)
  • New Resource: aws_datazone_glossary (#38602)
  • New Resource: aws_ecr_repository_creation_template (#38597)
  • New Resource: aws_timestreaminfluxdb_db_instance (#37963)

ENHANCEMENTS:

  • data-source/aws_eks_cluster: Add upgrade_policy attribute (#38573)
  • data-source/aws_sagemaker_prebuilt_ecr_image: Support additional repository_name values. See documentation for details (#38575)
  • resource/aws_appsync_graphql_api: Add enhanced_metrics_config configuration block (#38570)
  • resource/aws_db_instance: Add upgrade_storage_config argument (#36904)
  • resource/aws_default_vpc: Support ipv6_cidr_block sizes between /44 and /60 in increments of /4 (#35614)
  • resource/aws_default_vpc: Support ipv6_netmask_length values between 44 and 60 in increments of 4 (#35614)
  • resource/aws_eks_cluster: Add upgrade_policy configuration block (#38573)
  • resource/aws_elasticache_user_group_association: Add configurable create and delete timeouts (#38559)
  • resource/aws_pipes_pipe: Add log_configuration.include_execution_data argument (#38569)
  • resource/aws_rds_cluster: Add performance_insights_enabled, performance_insights_kms_key_id, and performance_insights_retention_period arguments (#29415)
  • resource/aws_rds_cluster: Add restore_to_point_in_time.source_cluster_resource_id argument (#38540)
  • resource/aws_rds_cluster: Mark restore_to_point_in_time.source_cluster_identifier as Optional (#38540)
  • resource/aws_sfn_activity: Add encryption_configuration configuration block to support the use of Customer Managed Keys with AWS KMS to encrypt Step Functions Activity resources (#38574)
  • resource/aws_sfn_state_machine: Add encryption_configuration configuration block to support the use of Customer Managed Keys with AWS KMS to encrypt Step Functions State Machine resources (#38574)
  • resource/aws_ssm_patch_baseline: Remove empty fields from json attribute value (#35950)
  • resource/aws_storagegateway_file_system_association: Add configurable timeouts (#38554)
  • resource/aws_vpc: Support ipv6_cidr_block sizes between /44 and /60 in increments of /4 (#35614)
  • resource/aws_vpc: Support ipv6_netmask_length values between 44 and 60 in increments of 4 (#35614)
  • resource/aws_vpc_ipv6_cidr_block_association: Add assign_generated_ipv6_cidr_block and ipv6_pool arguments (#27274)
  • resource/aws_vpc_ipv6_cidr_block_association: Support ipv6_cidr_block sizes between /44 and /60 in increments of /4 (#35614)
  • resource/aws_vpc_ipv6_cidr_block_association: Support ipv6_netmask_length values between 44 and 60 in increments of 4 (#35614)
  • resource/aws_vpc_security_group_egress_rule: Add tags to the AuthorizeSecurityGroupEgress EC2 API call instead of making a separate CreateTags call (#35614)
  • resource/aws_vpc_security_group_ingress_rule: Add tags to the AuthorizeSecurityGroupIngress EC2 API call instead of making a separate CreateTags call (#35614)
  • resource/aws_wafv2_web_acl: Add rule_json attribute to allow raw JSON for rules. (#38309)

BUG FIXES:

  • data-source/aws_appstream_image: Fix issue where the most recent image is not returned (#38571)
  • datasource/aws_networkmanager_core_network_policy_document: Fix CoreNetworkPolicyException when putting policy with single wildcard in when_sent_to (#38595)
  • resource/aws_cloudsearch_domain: Fix index_name character length validation (#38509)
  • resource/aws_ecs_task_definition: Ensure that JSON keys in container_definitions start with a lowercase letter (#38622)
  • resource/aws_iot_provisioning_template: Properly send type argument on create when configured (#38640)
  • resource/aws_opensearchserverless_security_policy: Normalize policy content to prevent persistent differences (#38604)

... (truncated)

Commits
  • 534f273 Update CHANGELOG.md for #38309
  • 153d847 Merge pull request #38309 from hashicorp/f-wafv2_acl_rule
  • 220214f Merge pull request #38602 from hashicorp/f/datazone-glossary-resource
  • 17ce18a Test cleanup 2
  • 9c9dcbc Update CHANGELOG.md for #38648
  • e5c138c Merge pull request #38648 from hashicorp/t-go-mod
  • ac3df3f Merge pull request #38547 from felipempda/b-aws_sagemaker_domain-missingRStud...
  • e461f53 r/aws_wafv2_web_acl(test): cases for rule_json expander
  • b2c3e80 r/aws_wafv2_web_acl: error when rule_json contains zero value rule
  • 6a3b189 go mod tidy
  • Additional commits viewable in compare view

Updates hashicorp/http from 3.4.2 to 3.4.4

Release notes

Sourced from hashicorp/http's releases.

v3.4.4

NOTES:

  • data-source/http: Previous versions of this provider ignored any Host headers specified in the request_headers attribute when setting the HTTP request. Any specified Host request header will now be set on the HTTP request.

For example, in the following configuration:

data "http" "example" {
  url      = "https://www.example.com"
  request_headers = {
    Host = "www.differentexample.com"
  }
}

The HTTP request URL host is still www.example.com but the HTTP request Host header will now be www.differentexample.com instead of www.example.com. (#440)

BUG FIXES:

  • data-source/http: Allow Host header in request_headers to be set on HTTP request (#440)

v3.4.3

BUG FIXES:

  • data-source/http: Avoid potentially leaking URL-embedded basic authentication credentials in logs and error messages (#429)
Changelog

Sourced from hashicorp/http's changelog.

3.4.4 (July 31, 2024)

NOTES:

  • data-source/http: Previous versions of this provider ignored any Host headers specified in the request_headers attribute when setting the HTTP request. Any specified Host request header will now be set on the HTTP request.

For example, in the following configuration:

data "http" "example" {
  url      = "https://www.example.com"
  request_headers = {
    Host = "www.differentexample.com"
  }
}

The HTTP request URL host is still www.example.com but the HTTP request Host header will now be www.differentexample.com instead of www.example.com. (#440)

BUG FIXES:

  • data-source/http: Allow Host header in request_headers to be set on HTTP request (#440)

3.4.3 (June 03, 2024)

BUG FIXES:

  • data-source/http: Avoid potentially leaking URL-embedded basic authentication credentials in logs and error messages (#429)
Commits
  • 25bea2d Update changelog
  • 270412b Clarify HTTP Host header changelog wording and make header check case-insen...
  • fb5fd5a Allow Host request header to override the http request host (#440)
  • ec7c3b8 Result of tsccr-helper -log-level=info gha update -latest . (#442)
  • eb6e2b0 Result of tsccr-helper -log-level=info gha update -latest . (#441)
  • 6cfce64 build(deps): bump github.com/hashicorp/terraform-plugin-framework-validators ...
  • c0493ab build(deps): bump github.com/hashicorp/terraform-plugin-testing (#438)
  • a95fd56 build(deps): bump github.com/hashicorp/terraform-plugin-framework (#439)
  • 4aaccd4 build(deps): bump golang.org/x/net from 0.26.0 to 0.27.0 (#436)
  • 29bc4eb build(deps): bump github.com/hashicorp/copywrite in /tools (#435)
  • Additional commits viewable in compare view

Updates integrations/github from 5.42.0 to 6.2.3

Release notes

Sourced from integrations/github's releases.

v6.2.3

What's Changed

🛠️ Maintenance

🏷 Other Changes

New Contributors

Full Changelog: https://github.com/integrations/terraform-provider-github/compare/v6.2.2...v6.2.3

v6.2.2

What's Changed

🛠️ Maintenance

🏷 Other Changes

... (truncated)

Commits
  • 782d71f docs: mark enterprise runner visibility required (#2278)
  • d3784bd Bump go-github to v62 + fixes (#2304)
  • 99d1937 build(deps): bump the github-actions group with 2 updates (#2303)
  • 2a17feb Fixing enterprise id reference (#2274)
  • 5ce4588 build(deps): bump goreleaser/goreleaser-action from 5.1.0 to 6.0.0 (#2293)
  • aa7f68a goreleaser deprecation: skip --> disable (#2294)
  • 33787a9 build(deps): bump the github-actions group with 2 updates (#2292)
  • 01239e8 docs: add missing quote in branch protection v3 example (#2283)
  • 350d8f0 docs: update title and code highlighting for github_repository_ruleset (#2285)
  • aa07277 improve documentation for github_repository (#2265)
  • Additional commits viewable in compare view

Updates opensearch-project/opensearch from 2.2.1 to 2.3.0

Release notes

Sourced from opensearch-project/opensearch's releases.

v2.3.0

What's Changed

  • Fix serverl...

    Description has been truncated

dependabot[bot] avatar Aug 07 '24 09:08 dependabot[bot]