Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump hashicorp/google from 5.40.0 to 5.41.0 in /terraform-init #566

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Aug 13, 2024

Bumps hashicorp/google from 5.40.0 to 5.41.0.

Release notes

Sourced from hashicorp/google's releases.

v5.41.0

DEPRECATIONS:

  • resourcemanager: deprecated skip_delete field in the google_project resource. Use deletion_policy instead. (#18867)

FEATURES:

  • New Data Source: google_logging_log_view_iam_policy (#18990)
  • New Data Source: google_scc_v2_organization_source_iam_policy (#19004)
  • New Resource: google_access_context_manager_service_perimeter_dry_run_egress_policy (#18994)
  • New Resource: google_access_context_manager_service_perimeter_dry_run_ingress_policy (#18994)
  • New Resource: google_scc_v2_folder_mute_config (#18924)
  • New Resource: google_scc_v2_project_mute_config (#18993)
  • New Resource: google_scc_v2_project_notification_config (#19008)
  • New Resource: google_scc_v2_organization_source (#19004)
  • New Resource: google_scc_v2_organization_source_iam_binding (#19004)
  • New Resource: google_scc_v2_organization_source_iam_member (#19004)
  • New Resource: google_scc_v2_organization_source_iam_policy (#19004)
  • New Resource: google_logging_log_view_iam_binding (#18990)
  • New Resource: google_logging_log_view_iam_member (#18990)
  • New Resource: google_logging_log_view_iam_policy (#18990)

IMPROVEMENTS:

  • clouddeploy: added gke.proxy_url field to google_clouddeploy_target (#19016)
  • cloudrunv2: added field binary_authorization.policy to resource google_cloud_run_v2_job and resource google_cloud_run_v2_service to support named binary authorization policy. (#18995)
  • compute: added source_regions field to google_compute_healthcheck resource (#19006)
  • compute: added update-in-place support for the google_compute_target_https_proxy.server_tls_policy field (#18996)
  • compute: added update-in-place support for the google_compute_region_target_https_proxy.server_tls_policy field (#19007)
  • container: added auto_provisioning_locations field to google_container_cluster (#18928)
  • dataform: added kms_key_name field to google_dataform_repository resource (#18947)
  • discoveryengine: added skip_default_schema_creation field to google_discovery_engine_data_store resource (#19017)
  • gkehub: added configmanagement.management and configmanagement.config_sync.enabled fields to google_gkehub_feature_membership (#19016)
  • gkehub: added management field to google_gke_hub_feature.fleet_default_member_config.configmanagement (#18963)
  • resourcemanager: added deletion_policy field to the google_project resource. Setting deletion_policy to PREVENT will protect the project against any destroy actions caused by a terraform apply or terraform destroy. Setting deletion_policy to ABANDON allows the resource to be abandoned rather than deleted and it behaves the same with skip_delete = true. Default value is DELETE. skip_delete = true takes precedence over deletion_policy = "DELETE".
  • storage: added force_destroy field to google_storage_managed_folder resource (#18973)
  • storage: added generation field to google_storage_bucket_object resource (#18971)

BUG FIXES:

  • compute: fixed google_compute_instance.alias_ip_range update behavior to avoid temporarily deleting unchanged alias IP ranges (#19015)
  • compute: fixed the bug that creation of PSC forwarding rules fails in google_compute_forwarding_rule resource when provider default labels are set (#18984)
  • sql: fixed a perma-diff in settings.insights_config in google_sql_database_instance (#18962)
Changelog

Sourced from hashicorp/google's changelog.

5.41.0 (August 13, 2024)

DEPRECATIONS:

  • resourcemanager: deprecated skip_delete field in the google_project resource. Use deletion_policy instead. (#18867)

FEATURES:

  • New Data Source: google_logging_log_view_iam_policy (#18990)
  • New Data Source: google_scc_v2_organization_source_iam_policy (#19004)
  • New Resource: google_access_context_manager_service_perimeter_dry_run_egress_policy (#18994)
  • New Resource: google_access_context_manager_service_perimeter_dry_run_ingress_policy (#18994)
  • New Resource: google_scc_v2_folder_mute_config (#18924)
  • New Resource: google_scc_v2_project_mute_config (#18993)
  • New Resource: google_scc_v2_project_notification_config (#19008)
  • New Resource: google_scc_v2_organization_source (#19004)
  • New Resource: google_scc_v2_organization_source_iam_binding (#19004)
  • New Resource: google_scc_v2_organization_source_iam_member (#19004)
  • New Resource: google_scc_v2_organization_source_iam_policy (#19004)
  • New Resource: google_logging_log_view_iam_binding (#18990)
  • New Resource: google_logging_log_view_iam_member (#18990)
  • New Resource: google_logging_log_view_iam_policy (#18990)

IMPROVEMENTS:

  • clouddeploy: added gke.proxy_url field to google_clouddeploy_target (#19016)
  • cloudrunv2: added field binary_authorization.policy to resource google_cloud_run_v2_job and resource google_cloud_run_v2_service to support named binary authorization policy. (#18995)
  • compute: added source_regions field to google_compute_healthcheck resource (#19006)
  • compute: added update-in-place support for the google_compute_target_https_proxy.server_tls_policy field (#18996)
  • compute: added update-in-place support for the google_compute_region_target_https_proxy.server_tls_policy field (#19007)
  • container: added auto_provisioning_locations field to google_container_cluster (#18928)
  • dataform: added kms_key_name field to google_dataform_repository resource (#18947)
  • discoveryengine: added skip_default_schema_creation field to google_discovery_engine_data_store resource (#19017)
  • gkehub: added configmanagement.management and configmanagement.config_sync.enabled fields to google_gkehub_feature_membership (#19016)
  • gkehub: added management field to google_gke_hub_feature.fleet_default_member_config.configmanagement (#18963)
  • resourcemanager: added deletion_policy field to the google_project resource. Setting deletion_policy to PREVENT will protect the project against any destroy actions caused by a terraform apply or terraform destroy. Setting deletion_policy to ABANDON allows the resource to be abandoned rather than deleted and it behaves the same with skip_delete = true. Default value is DELETE. skip_delete = true takes precedence over deletion_policy = "DELETE".
  • storage: added force_destroy field to google_storage_managed_folder resource (#18973)
  • storage: added generation field to google_storage_bucket_object resource (#18971)

BUG FIXES:

  • compute: fixed google_compute_instance.alias_ip_range update behavior to avoid temporarily deleting unchanged alias IP ranges (#19015)
  • compute: fixed the bug that creation of PSC forwarding rules fails in google_compute_forwarding_rule resource when provider default labels are set (#18984)
  • sql: fixed a perma-diff in settings.insights_config in google_sql_database_instance (#18962)
Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [hashicorp/google](https://github.com/hashicorp/terraform-provider-google) from 5.40.0 to 5.41.0.
- [Release notes](https://github.com/hashicorp/terraform-provider-google/releases)
- [Changelog](https://github.com/hashicorp/terraform-provider-google/blob/main/CHANGELOG.md)
- [Commits](hashicorp/terraform-provider-google@v5.40.0...v5.41.0)

---
updated-dependencies:
- dependency-name: hashicorp/google
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file terraform Pull requests that update Terraform code labels Aug 13, 2024
@github-actions github-actions bot enabled auto-merge August 13, 2024 22:47
@github-actions github-actions bot added this pull request to the merge queue Aug 13, 2024
Merged via the queue into main with commit 1076c76 Aug 13, 2024
33 checks passed
@dependabot dependabot bot deleted the dependabot/terraform/terraform-init/hashicorp/google-5.41.0 branch August 13, 2024 22:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file terraform Pull requests that update Terraform code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants