osinfra-io / google-cloud-kubernetes

Infrastructure as Code (IaC) example for Google Cloud Platform Kubernetes resources.
https://www.osinfra.io
GNU General Public License v2.0
1 stars 0 forks source link

Bump hashicorp/google from 5.40.0 to 5.41.0 #85

Closed dependabot[bot] closed 3 months ago

dependabot[bot] commented 3 months ago

Bumps hashicorp/google from 5.40.0 to 5.41.0.

Release notes

Sourced from hashicorp/google's releases.

v5.41.0

DEPRECATIONS:

  • resourcemanager: deprecated skip_delete field in the google_project resource. Use deletion_policy instead. (#18867)

FEATURES:

  • New Data Source: google_logging_log_view_iam_policy (#18990)
  • New Data Source: google_scc_v2_organization_source_iam_policy (#19004)
  • New Resource: google_access_context_manager_service_perimeter_dry_run_egress_policy (#18994)
  • New Resource: google_access_context_manager_service_perimeter_dry_run_ingress_policy (#18994)
  • New Resource: google_scc_v2_folder_mute_config (#18924)
  • New Resource: google_scc_v2_project_mute_config (#18993)
  • New Resource: google_scc_v2_project_notification_config (#19008)
  • New Resource: google_scc_v2_organization_source (#19004)
  • New Resource: google_scc_v2_organization_source_iam_binding (#19004)
  • New Resource: google_scc_v2_organization_source_iam_member (#19004)
  • New Resource: google_scc_v2_organization_source_iam_policy (#19004)
  • New Resource: google_logging_log_view_iam_binding (#18990)
  • New Resource: google_logging_log_view_iam_member (#18990)
  • New Resource: google_logging_log_view_iam_policy (#18990)

IMPROVEMENTS:

  • clouddeploy: added gke.proxy_url field to google_clouddeploy_target (#19016)
  • cloudrunv2: added field binary_authorization.policy to resource google_cloud_run_v2_job and resource google_cloud_run_v2_service to support named binary authorization policy. (#18995)
  • compute: added source_regions field to google_compute_healthcheck resource (#19006)
  • compute: added update-in-place support for the google_compute_target_https_proxy.server_tls_policy field (#18996)
  • compute: added update-in-place support for the google_compute_region_target_https_proxy.server_tls_policy field (#19007)
  • container: added auto_provisioning_locations field to google_container_cluster (#18928)
  • dataform: added kms_key_name field to google_dataform_repository resource (#18947)
  • discoveryengine: added skip_default_schema_creation field to google_discovery_engine_data_store resource (#19017)
  • gkehub: added configmanagement.management and configmanagement.config_sync.enabled fields to google_gkehub_feature_membership (#19016)
  • gkehub: added management field to google_gke_hub_feature.fleet_default_member_config.configmanagement (#18963)
  • resourcemanager: added deletion_policy field to the google_project resource. Setting deletion_policy to PREVENT will protect the project against any destroy actions caused by a terraform apply or terraform destroy. Setting deletion_policy to ABANDON allows the resource to be abandoned rather than deleted and it behaves the same with skip_delete = true. Default value is DELETE. skip_delete = true takes precedence over deletion_policy = "DELETE".
  • storage: added force_destroy field to google_storage_managed_folder resource (#18973)
  • storage: added generation field to google_storage_bucket_object resource (#18971)

BUG FIXES:

  • compute: fixed google_compute_instance.alias_ip_range update behavior to avoid temporarily deleting unchanged alias IP ranges (#19015)
  • compute: fixed the bug that creation of PSC forwarding rules fails in google_compute_forwarding_rule resource when provider default labels are set (#18984)
  • sql: fixed a perma-diff in settings.insights_config in google_sql_database_instance (#18962)
Changelog

Sourced from hashicorp/google's changelog.

5.41.0 (August 13, 2024)

DEPRECATIONS:

  • resourcemanager: deprecated skip_delete field in the google_project resource. Use deletion_policy instead. (#18867)

FEATURES:

  • New Data Source: google_logging_log_view_iam_policy (#18990)
  • New Data Source: google_scc_v2_organization_source_iam_policy (#19004)
  • New Resource: google_access_context_manager_service_perimeter_dry_run_egress_policy (#18994)
  • New Resource: google_access_context_manager_service_perimeter_dry_run_ingress_policy (#18994)
  • New Resource: google_scc_v2_folder_mute_config (#18924)
  • New Resource: google_scc_v2_project_mute_config (#18993)
  • New Resource: google_scc_v2_project_notification_config (#19008)
  • New Resource: google_scc_v2_organization_source (#19004)
  • New Resource: google_scc_v2_organization_source_iam_binding (#19004)
  • New Resource: google_scc_v2_organization_source_iam_member (#19004)
  • New Resource: google_scc_v2_organization_source_iam_policy (#19004)
  • New Resource: google_logging_log_view_iam_binding (#18990)
  • New Resource: google_logging_log_view_iam_member (#18990)
  • New Resource: google_logging_log_view_iam_policy (#18990)

IMPROVEMENTS:

  • clouddeploy: added gke.proxy_url field to google_clouddeploy_target (#19016)
  • cloudrunv2: added field binary_authorization.policy to resource google_cloud_run_v2_job and resource google_cloud_run_v2_service to support named binary authorization policy. (#18995)
  • compute: added source_regions field to google_compute_healthcheck resource (#19006)
  • compute: added update-in-place support for the google_compute_target_https_proxy.server_tls_policy field (#18996)
  • compute: added update-in-place support for the google_compute_region_target_https_proxy.server_tls_policy field (#19007)
  • container: added auto_provisioning_locations field to google_container_cluster (#18928)
  • dataform: added kms_key_name field to google_dataform_repository resource (#18947)
  • discoveryengine: added skip_default_schema_creation field to google_discovery_engine_data_store resource (#19017)
  • gkehub: added configmanagement.management and configmanagement.config_sync.enabled fields to google_gkehub_feature_membership (#19016)
  • gkehub: added management field to google_gke_hub_feature.fleet_default_member_config.configmanagement (#18963)
  • resourcemanager: added deletion_policy field to the google_project resource. Setting deletion_policy to PREVENT will protect the project against any destroy actions caused by a terraform apply or terraform destroy. Setting deletion_policy to ABANDON allows the resource to be abandoned rather than deleted and it behaves the same with skip_delete = true. Default value is DELETE. skip_delete = true takes precedence over deletion_policy = "DELETE".
  • storage: added force_destroy field to google_storage_managed_folder resource (#18973)
  • storage: added generation field to google_storage_bucket_object resource (#18971)

BUG FIXES:

  • compute: fixed google_compute_instance.alias_ip_range update behavior to avoid temporarily deleting unchanged alias IP ranges (#19015)
  • compute: fixed the bug that creation of PSC forwarding rules fails in google_compute_forwarding_rule resource when provider default labels are set (#18984)
  • sql: fixed a perma-diff in settings.insights_config in google_sql_database_instance (#18962)
Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Summary by CodeRabbit

coderabbitai[bot] commented 3 months ago

[!CAUTION]

Review failed

The pull request is closed.

Walkthrough

The recent update to the Terraform configuration involves upgrading the Google provider from version 5.40.0 to 5.41.0. This change introduces potential improvements and bug fixes that enhance functionality and reliability within the Terraform setup for Google services. Additionally, the associated hash values have been updated to ensure the integrity of this new version, reinforcing the importance of accuracy and consistency in deployment processes.

Changes

Files Change Summary
.terraform.lock.hcl Updated Google provider version from 5.40.0 to 5.41.0 and modified hash values.

Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

Share - [X](https://twitter.com/intent/tweet?text=I%20just%20used%20%40coderabbitai%20for%20my%20code%20review%2C%20and%20it%27s%20fantastic%21%20It%27s%20free%20for%20OSS%20and%20offers%20a%20free%20trial%20for%20the%20proprietary%20code.%20Check%20it%20out%3A&url=https%3A//coderabbit.ai) - [Mastodon](https://mastodon.social/share?text=I%20just%20used%20%40coderabbitai%20for%20my%20code%20review%2C%20and%20it%27s%20fantastic%21%20It%27s%20free%20for%20OSS%20and%20offers%20a%20free%20trial%20for%20the%20proprietary%20code.%20Check%20it%20out%3A%20https%3A%2F%2Fcoderabbit.ai) - [Reddit](https://www.reddit.com/submit?title=Great%20tool%20for%20code%20review%20-%20CodeRabbit&text=I%20just%20used%20CodeRabbit%20for%20my%20code%20review%2C%20and%20it%27s%20fantastic%21%20It%27s%20free%20for%20OSS%20and%20offers%20a%20free%20trial%20for%20proprietary%20code.%20Check%20it%20out%3A%20https%3A//coderabbit.ai) - [LinkedIn](https://www.linkedin.com/sharing/share-offsite/?url=https%3A%2F%2Fcoderabbit.ai&mini=true&title=Great%20tool%20for%20code%20review%20-%20CodeRabbit&summary=I%20just%20used%20CodeRabbit%20for%20my%20code%20review%2C%20and%20it%27s%20fantastic%21%20It%27s%20free%20for%20OSS%20and%20offers%20a%20free%20trial%20for%20proprietary%20code)
Tips ### Chat There are 3 ways to chat with [CodeRabbit](https://coderabbit.ai): - Review comments: Directly reply to a review comment made by CodeRabbit. Example: - `I pushed a fix in commit .` - `Generate unit testing code for this file.` - `Open a follow-up GitHub issue for this discussion.` - Files and specific lines of code (under the "Files changed" tab): Tag `@coderabbitai` in a new review comment at the desired location with your query. Examples: - `@coderabbitai generate unit testing code for this file.` - `@coderabbitai modularize this function.` - PR comments: Tag `@coderabbitai` in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples: - `@coderabbitai generate interesting stats about this repository and render them as a table.` - `@coderabbitai show all the console.log statements in this repository.` - `@coderabbitai read src/utils.ts and generate unit testing code.` - `@coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.` - `@coderabbitai help me debug CodeRabbit configuration file.` Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. ### CodeRabbit Commands (invoked as PR comments) - `@coderabbitai pause` to pause the reviews on a PR. - `@coderabbitai resume` to resume the paused reviews. - `@coderabbitai review` to trigger an incremental review. This is useful when automatic reviews are disabled for the repository. - `@coderabbitai full review` to do a full review from scratch and review all the files again. - `@coderabbitai summary` to regenerate the summary of the PR. - `@coderabbitai resolve` resolve all the CodeRabbit review comments. - `@coderabbitai configuration` to show the current CodeRabbit configuration for the repository. - `@coderabbitai help` to get help. Additionally, you can add `@coderabbitai ignore` anywhere in the PR description to prevent this PR from being reviewed. ### CodeRabbit Configuration File (`.coderabbit.yaml`) - You can programmatically configure CodeRabbit by adding a `.coderabbit.yaml` file to the root of your repository. - Please see the [configuration documentation](https://docs.coderabbit.ai/guides/configure-coderabbit) for more information. - If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: `# yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json` ### Documentation and Community - Visit our [Documentation](https://coderabbit.ai/docs) for detailed information on how to use CodeRabbit. - Join our [Discord Community](https://discord.com/invite/GsXnASn26c) to get help, request features, and share feedback. - Follow us on [X/Twitter](https://twitter.com/coderabbitai) for updates and announcements.