nlamirault / terraform-digitalocean-doks

Terraform module for Digital Ocean Kubernetes (DOKS)
8 stars 8 forks source link

Update dependency hashicorp/terraform to v1.2.4 #19

Closed renovate[bot] closed 2 years ago

renovate[bot] commented 2 years ago

Mend Renovate

This PR contains the following updates:

Package Update Change
hashicorp/terraform patch 1.2.2 -> 1.2.4

Release Notes

hashicorp/terraform ### [`v1.2.4`](https://togithub.com/hashicorp/terraform/releases/tag/v1.2.4) [Compare Source](https://togithub.com/hashicorp/terraform/compare/v1.2.3...v1.2.4) #### 1.2.4 (June 29, 2022) ENHANCEMENTS: - Improved validation of `required_providers` to prevent single providers from being required with multiple names. ([#​31218](https://togithub.com/hashicorp/terraform/issues/31218)) - Improved plan performance by optimizing `addrs.Module.String` for allocations. ([#​31293](https://togithub.com/hashicorp/terraform/issues/31293)) BUG FIXES: - backend/http: Fixed bug where the HTTP backend would fail to retry acquiring the state lock and ignored the `-lock-timeout` flag. ([#​31256](https://togithub.com/hashicorp/terraform/issues/31256)) - Fix crash if a `precondition` or `postcondition` block omitted the required `condition` argument. ([#​31290](https://togithub.com/hashicorp/terraform/issues/31290)) ### [`v1.2.3`](https://togithub.com/hashicorp/terraform/releases/tag/v1.2.3) [Compare Source](https://togithub.com/hashicorp/terraform/compare/v1.2.2...v1.2.3) ##### 1.2.3 (June 15, 2022) UPGRADE NOTES: - The following remote state backends are now marked as deprecated, and are planned to be removed in a future Terraform release. These backends have been unmaintained since before Terraform v1.0, and may contain known bugs, outdated packages, or security vulnerabilities. - artifactory - etcd - etcdv3 - manta - swift BUG FIXES: - Missing check for error diagnostics in GetProviderSchema could result in panic ([#​31184](https://togithub.com/hashicorp/terraform/issues/31184)) - Module registries returning X-Terraform-Get locations with no URL would error with "no getter available for X-Terraform-Get source protocol" ([#​31237](https://togithub.com/hashicorp/terraform/issues/31237)) - Fix crash from concurrent operation on shared set of resource instance dependencies ([#​31246](https://togithub.com/hashicorp/terraform/issues/31246)) - backend/cos: `tencentcloud-terraform-lock` tag was not removed in all cases ([#​31223](https://togithub.com/hashicorp/terraform/issues/31223))

Configuration

πŸ“… Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

β™» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

πŸ”• Ignore: Close this PR and you won't be reminded about this update again.



This PR has been generated by Mend Renovate. View repository job log here.

github-actions[bot] commented 2 years ago

Terraform Security Scan Failed

Show Output ```hcl Result #1 MEDIUM Surge upgrades are disabled in your Kubernetes cluster. Please enable this feature. ──────────────────────────────────────────────────────────────────────────────── cluster.tf:15-39 ──────────────────────────────────────────────────────────────────────────────── 15 β”Œ resource "digitalocean_kubernetes_cluster" "k8s" { 16 β”‚ name = var.cluster_name 17 β”‚ region = var.region 18 β”‚ version = data.digitalocean_kubernetes_versions.k8s.latest_version 19 β”‚ #var.kubernetes_version 20 β”‚ 21 β”‚ auto_upgrade = var.auto_upgrade 22 β”‚ tags = var.tags 23 β”” .. ──────────────────────────────────────────────────────────────────────────────── ID digitalocean-compute-surge-upgrades-not-enabled Impact Upgrades may influence availability of your Kubernetes cluster Resolution Enable surge upgrades in your Kubernetes cluster More Information - https://aquasecurity.github.io/tfsec/latest/checks/digitalocean/compute/surge-upgrades-not-enabled/ - https://registry.terraform.io/providers/digitalocean/digitalocean/latest/docs/resources/kubernetes_cluster#surge_upgrade ──────────────────────────────────────────────────────────────────────────────── timings ────────────────────────────────────────── disk i/o 125.709Β΅s parsing 933.167Β΅s adaptation 98.107Β΅s checks 28.03947ms total 29.196453ms counts ────────────────────────────────────────── modules downloaded 0 modules processed 1 blocks processed 20 files read 5 results ────────────────────────────────────────── passed 1 ignored 0 critical 0 high 0 medium 1 low 0 1 passed, 1 potential problem(s) detected. ```
github-actions[bot] commented 2 years ago

Terraform Security Scan Failed

Show Output ```hcl Result #1 MEDIUM Surge upgrades are disabled in your Kubernetes cluster. Please enable this feature. ──────────────────────────────────────────────────────────────────────────────── cluster.tf:15-39 ──────────────────────────────────────────────────────────────────────────────── 15 β”Œ resource "digitalocean_kubernetes_cluster" "k8s" { 16 β”‚ name = var.cluster_name 17 β”‚ region = var.region 18 β”‚ version = data.digitalocean_kubernetes_versions.k8s.latest_version 19 β”‚ #var.kubernetes_version 20 β”‚ 21 β”‚ auto_upgrade = var.auto_upgrade 22 β”‚ tags = var.tags 23 β”” .. ──────────────────────────────────────────────────────────────────────────────── ID digitalocean-compute-surge-upgrades-not-enabled Impact Upgrades may influence availability of your Kubernetes cluster Resolution Enable surge upgrades in your Kubernetes cluster More Information - https://aquasecurity.github.io/tfsec/latest/checks/digitalocean/compute/surge-upgrades-not-enabled/ - https://registry.terraform.io/providers/digitalocean/digitalocean/latest/docs/resources/kubernetes_cluster#surge_upgrade ──────────────────────────────────────────────────────────────────────────────── timings ────────────────────────────────────────── disk i/o 81.701Β΅s parsing 769.81Β΅s adaptation 82.301Β΅s checks 24.463644ms total 25.397456ms counts ────────────────────────────────────────── modules downloaded 0 modules processed 1 blocks processed 20 files read 5 results ────────────────────────────────────────── passed 1 ignored 0 critical 0 high 0 medium 1 low 0 1 passed, 1 potential problem(s) detected. ```