Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update terraform google to v6.13.0 #266

Merged
merged 1 commit into from
Dec 10, 2024

Conversation

usa-reddragon-renovate-ce[bot]
Copy link
Contributor

This PR contains the following updates:

Package Type Update Change
google (source) required_provider minor 6.12.0 -> 6.13.0

Release Notes

hashicorp/terraform-provider-google (google)

v6.13.0

Compare Source

NOTES:

  • New ephemeral resources google_service_account_access_token, google_service_account_id_token, google_service_account_jwt, google_service_account_key now support ephemeral values.
  • iam3: promoted resources google_iam_principal_access_boundary_policy, google_iam_organizations_policy_binding, google_iam_folders_policy_binding and google_iam_projects_policy_binding to GA (#​20475)
    DEPRECATIONS:
  • gkehub: deprecated configmanagement.config_sync.metrics_gcp_service_account_email in google_gke_hub_feature_membership resource (#​20561)

FEATURES:

  • New Ephemeral Resource: google_service_account_access_token (#​20542)
  • New Ephemeral Resource: google_service_account_id_token (#​20542)
  • New Ephemeral Resource: google_service_account_jwt (#​20542)
  • New Ephemeral Resource: google_service_account_key (#​20542)
  • New Data Source: google_backup_dr_backup_vault (#​20468)
  • New Data Source: google_composer_user_workloads_config_map (GA) (#​20478)
  • New Data Source: google_composer_user_workloads_secret (GA) (#​20478)
  • New Resource: google_composer_user_workloads_config_map (GA) (#​20478)
  • New Resource: google_composer_user_workloads_secret (GA) (#​20478)
  • New Resource: google_gemini_code_repository_index (#​20474)
  • New Resource: google_network_security_mirroring_deployment (#​20489)
  • New Resource: google_network_security_mirroring_deployment_group (#​20489)
  • New Resource: google_network_security_mirroring_endpoint_group_association (#​20489)
  • New Resource: google_network_security_mirroring_endpoint_group (#​20489)

IMPROVEMENTS:

  • accesscontextmanager: added etag to google_access_context_manager_service_perimeter and google_access_context_manager_service_perimeters (#​20455)
  • alloydb: increased default timeout on google_alloydb_cluster to 120m from 30m (#​20547)
  • bigtable: added row_affinity field to google_bigtable_app_profile resource (#​20435)
  • cloudbuild: added private_service_connect field to google_cloudbuild_worker_pool resource (#​20561)
  • clouddeploy: added associated_entities field to google_clouddeploy_target resource (#​20561)
  • clouddeploy: added serial_pipeline.strategy.canary.runtime_config.kubernetes.gateway_service_mesh.route_destinations field to google_clouddeploy_delivery_pipeline resource (#​20561)
  • composer: added multiple composer 3 related fields to google_composer_environment (GA) (#​20478)
  • compute: google_compute_instance, google_compute_instance_template, google_compute_region_instance_template now supports advanced_machine_features.enable_uefi_networking field (#​20531)
  • compute: added support for specifying storage pool with name or partial url (#​20502)
  • compute: added numeric_id to the google_compute_network data source (#​20548)
  • compute: added threshold_configs field to google_compute_security_policy resource (#​20545)
  • compute: added server generated id as forwarding_rule_id to google_compute_global_forwarding_rule (#​20404)
  • compute: added server generated id as health_check_id to google_region_health_check (#​20404)
  • compute: added server generated id as instance_group_manager_id to google_instance_group_manager (#​20404)
  • compute: added server generated id as instance_group_manager_id to google_region_instance_group_manager (#​20404)
  • compute: added server generated id as network_endpoint_id to google_region_network_endpoint (#​20404)
  • compute: added server generated id as subnetwork_id to google_subnetwork (#​20404)
  • compute: added the psc_data field to the google_compute_region_network_endpoint_group resource (#​20454)
  • container: added enterprise_config field to google_container_cluster resource (#​20534)
  • container: added node_pool_autoconfig.linux_node_config.cgroup_mode field to google_container_cluster resource (#​20460)
  • dataproc: added autotuning_config and cohort fields to google_dataproc_batch (#​20410)
  • dataproc: added cluster_config.preemptible_worker_config.instance_flexibility_policy.provisioning_model_mix field to google_dataproc_cluster resource (#​20396)
  • dataproc: added confidential_instance_config field to google_dataproc_cluster resource (#​20488)
  • discoveryengine: added HEALTHCARE_FHIR to industry_vertical field in google_discovery_engine_search_engine (#​20471)
  • gkehub: added configmanagement.config_sync.stop_syncing field to google_gke_hub_feature_membership resource (#​20561)
  • monitoring: added disable_metric_validation field to google_monitoring_alert_policy resource (#​20544)
  • oracledatabase: added deletion_protection field to google_oracle_database_autonomous_database (#​20484)
  • oracledatabase: added deletion_protection field to google_oracle_database_cloud_exadata_infrastructure (#​20485)
  • oracledatabase: added deletion_protection field to google_oracle_database_cloud_vm_cluster (#​20392)
  • parallelstore: added deployment_type to google_parallelstore_instance (#​20457)
  • resourcemanager: made google_service_account email and member fields available during plan (#​20510)

BUG FIXES:

  • apigee: made google_apigee_organization wait for deletion operation to complete. (#​20504)
  • cloudfunctions: fixed issue when updating vpc_connector_egress_settings field for google_cloudfunctions_function resource. (#​20437)
  • dataproc: ensured oneOf condition is honored when expanding the job configuration for Hive, Pig, Spark-sql, and Presto in google_dataproc_job. (#​20453)
  • gkehub: fixed allowable value INSTALLATION_UNSPECIFIED in template_library.installation (#​20567)
  • sql: fixed edition downgrade failure for an ENTERPRISE_PLUS instance with data cache enabled. (#​20393)

Configuration

📅 Schedule: Branch creation - "after 1:00am, before 5:00am" in timezone America/Chicago, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Signed-off-by: usa-reddragon-renovate-ce[bot] <156608365+usa-reddragon-renovate-ce[bot]@users.noreply.github.com>
Copy link

GCP Terraform Checks

✅ Terraform Format and Style Passed

✅ Terraform Initialization Passed

✅ Terraform Validation Passed

✅ Terraform Plan Passed

terraform plan output
data.cloudflare_zone.site-zone: Reading...
data.google_compute_image.ubuntu: Reading...
data.google_compute_image.ubuntu: Read complete after 1s [id=projects/ubuntu-os-cloud/global/images/ubuntu-2204-jammy-v20241119]
data.cloudflare_zone.site-zone: Read complete after 1s [id=1896d1131a72f9255386a78c50024864]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.record will be created
  + resource "cloudflare_record" "record" {
      + allow_overwrite = false
      + content         = (known after apply)
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "dallas.aredn"
      + proxiable       = (known after apply)
      + proxied         = false
      + ttl             = (known after apply)
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "1896d1131a72f9255386a78c50024864"
    }

  # cloudflare_record.supernode-record will be created
  + resource "cloudflare_record" "supernode-record" {
      + allow_overwrite = false
      + content         = (known after apply)
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "supernode.dallas.aredn"
      + proxiable       = (known after apply)
      + proxied         = false
      + ttl             = (known after apply)
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "1896d1131a72f9255386a78c50024864"
    }

  # google_compute_address.ip will be created
  + resource "google_compute_address" "ip" {
      + address            = (known after apply)
      + address_type       = "EXTERNAL"
      + creation_timestamp = (known after apply)
      + effective_labels   = {
          + "goog-terraform-provisioned" = "true"
        }
      + id                 = (known after apply)
      + label_fingerprint  = (known after apply)
      + name               = "ki5vmf-dallas-gcp"
      + network_tier       = (known after apply)
      + prefix_length      = (known after apply)
      + project            = "supernode-401805"
      + purpose            = (known after apply)
      + region             = (known after apply)
      + self_link          = (known after apply)
      + subnetwork         = (known after apply)
      + terraform_labels   = {
          + "goog-terraform-provisioned" = "true"
        }
      + users              = (known after apply)
    }

  # google_compute_instance.default will be created
  + resource "google_compute_instance" "default" {
      + allow_stopping_for_update = true
      + can_ip_forward            = false
      + cpu_platform              = (known after apply)
      + creation_timestamp        = (known after apply)
      + current_status            = (known after apply)
      + deletion_protection       = false
      + effective_labels          = {
          + "goog-terraform-provisioned" = "true"
        }
      + id                        = (known after apply)
      + instance_id               = (known after apply)
      + label_fingerprint         = (known after apply)
      + machine_type              = "e2-highcpu-2"
      + metadata                  = (known after apply)
      + metadata_fingerprint      = (known after apply)
      + metadata_startup_script   = (sensitive value)
      + min_cpu_platform          = (known after apply)
      + name                      = "ki5vmf-dallas-gcp"
      + project                   = "supernode-401805"
      + self_link                 = (known after apply)
      + tags                      = [
          + "http-server",
          + "https-server",
          + "vtun-server",
          + "vtun-supernode-server",
          + "wireguard-server",
        ]
      + tags_fingerprint          = (known after apply)
      + terraform_labels          = {
          + "goog-terraform-provisioned" = "true"
        }
      + zone                      = "us-south1-b"

      + boot_disk {
          + auto_delete                = true
          + device_name                = (known after apply)
          + disk_encryption_key_sha256 = (known after apply)
          + kms_key_self_link          = (known after apply)
          + mode                       = "READ_WRITE"
          + source                     = (known after apply)

          + initialize_params {
              + image                  = "https://www.googleapis.com/compute/v1/projects/ubuntu-os-cloud/global/images/ubuntu-2204-jammy-v20241119"
              + labels                 = (known after apply)
              + provisioned_iops       = (known after apply)
              + provisioned_throughput = (known after apply)
              + resource_policies      = (known after apply)
              + size                   = 10
              + type                   = "pd-ssd"
            }
        }

      + confidential_instance_config (known after apply)

      + guest_accelerator (known after apply)

      + network_interface {
          + internal_ipv6_prefix_length = (known after apply)
          + ipv6_access_type            = (known after apply)
          + ipv6_address                = (known after apply)
          + name                        = (known after apply)
          + network                     = "default"
          + network_ip                  = (known after apply)
          + stack_type                  = (known after apply)
          + subnetwork                  = (known after apply)
          + subnetwork_project          = (known after apply)

          + access_config {
              + nat_ip       = (known after apply)
              + network_tier = (known after apply)
            }
        }

      + reservation_affinity (known after apply)

      + scheduling (known after apply)
    }

  # tls_private_key.key will be created
  + resource "tls_private_key" "key" {
      + algorithm                     = "RSA"
      + ecdsa_curve                   = "P224"
      + id                            = (known after apply)
      + private_key_openssh           = (sensitive value)
      + private_key_pem               = (sensitive value)
      + private_key_pem_pkcs8         = (sensitive value)
      + public_key_fingerprint_md5    = (known after apply)
      + public_key_fingerprint_sha256 = (known after apply)
      + public_key_openssh            = (known after apply)
      + public_key_pem                = (known after apply)
      + rsa_bits                      = 4096
    }

Plan: 5 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + key       = (sensitive value)
  + public-ip = (known after apply)

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Copy link

AWS Terraform Checks

✅ Terraform Format and Style Passed

✅ Terraform Initialization Passed

✅ Terraform Validation Passed

✅ Terraform Plan Passed

terraform plan output
data.cloudflare_zone.site-zone: Reading...
data.aws_ami.ubuntu-jammy: Reading...
data.cloudflare_zone.site-zone: Read complete after 0s [id=1896d1131a72f9255386a78c50024864]
data.aws_ami.ubuntu-jammy: Read complete after 0s [id=ami-05245affa1aea4cc6]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # aws_eip.ip will be created
  + resource "aws_eip" "ip" {
      + allocation_id        = (known after apply)
      + arn                  = (known after apply)
      + association_id       = (known after apply)
      + carrier_ip           = (known after apply)
      + customer_owned_ip    = (known after apply)
      + domain               = "vpc"
      + id                   = (known after apply)
      + instance             = (known after apply)
      + ipam_pool_id         = (known after apply)
      + network_border_group = (known after apply)
      + network_interface    = (known after apply)
      + private_dns          = (known after apply)
      + private_ip           = (known after apply)
      + ptr_record           = (known after apply)
      + public_dns           = (known after apply)
      + public_ip            = (known after apply)
      + public_ipv4_pool     = (known after apply)
      + tags_all             = (known after apply)
      + vpc                  = (known after apply)
    }

  # aws_instance.node will be created
  + resource "aws_instance" "node" {
      + ami                                  = "ami-05245affa1aea4cc6"
      + arn                                  = (known after apply)
      + associate_public_ip_address          = (known after apply)
      + availability_zone                    = "us-east-1a"
      + cpu_core_count                       = (known after apply)
      + cpu_threads_per_core                 = (known after apply)
      + disable_api_stop                     = (known after apply)
      + disable_api_termination              = (known after apply)
      + ebs_optimized                        = (known after apply)
      + get_password_data                    = false
      + host_id                              = (known after apply)
      + host_resource_group_arn              = (known after apply)
      + iam_instance_profile                 = (known after apply)
      + id                                   = (known after apply)
      + instance_initiated_shutdown_behavior = (known after apply)
      + instance_lifecycle                   = (known after apply)
      + instance_state                       = (known after apply)
      + instance_type                        = "t4g.small"
      + ipv6_address_count                   = (known after apply)
      + ipv6_addresses                       = (known after apply)
      + key_name                             = "KI5VMF-CLOUD-TUNNEL"
      + monitoring                           = (known after apply)
      + outpost_arn                          = (known after apply)
      + password_data                        = (known after apply)
      + placement_group                      = (known after apply)
      + placement_partition_number           = (known after apply)
      + primary_network_interface_id         = (known after apply)
      + private_dns                          = (known after apply)
      + private_ip                           = (known after apply)
      + public_dns                           = (known after apply)
      + public_ip                            = (known after apply)
      + secondary_private_ips                = (known after apply)
      + security_groups                      = (known after apply)
      + source_dest_check                    = true
      + spot_instance_request_id             = (known after apply)
      + subnet_id                            = (known after apply)
      + tags                                 = {
          + "Name" = "KI5VMF-CLOUD-TUNNEL"
        }
      + tags_all                             = {
          + "Name" = "KI5VMF-CLOUD-TUNNEL"
        }
      + tenancy                              = (known after apply)
      + user_data                            = (sensitive value)
      + user_data_base64                     = (known after apply)
      + user_data_replace_on_change          = true
      + vpc_security_group_ids               = (known after apply)

      + capacity_reservation_specification (known after apply)

      + cpu_options (known after apply)

      + ebs_block_device (known after apply)

      + enclave_options (known after apply)

      + ephemeral_block_device (known after apply)

      + instance_market_options (known after apply)

      + maintenance_options (known after apply)

      + metadata_options (known after apply)

      + network_interface (known after apply)

      + private_dns_name_options (known after apply)

      + root_block_device {
          + delete_on_termination = true
          + device_name           = (known after apply)
          + encrypted             = (known after apply)
          + iops                  = (known after apply)
          + kms_key_id            = (known after apply)
          + tags_all              = (known after apply)
          + throughput            = (known after apply)
          + volume_id             = (known after apply)
          + volume_size           = 8
          + volume_type           = "gp2"
        }
    }

  # aws_key_pair.key will be created
  + resource "aws_key_pair" "key" {
      + arn             = (known after apply)
      + fingerprint     = (known after apply)
      + id              = (known after apply)
      + key_name        = "KI5VMF-CLOUD-TUNNEL"
      + key_name_prefix = (known after apply)
      + key_pair_id     = (known after apply)
      + key_type        = (known after apply)
      + public_key      = (known after apply)
      + tags_all        = (known after apply)
    }

  # aws_security_group.allow-vpn will be created
  + resource "aws_security_group" "allow-vpn" {
      + arn                    = (known after apply)
      + description            = "Security Group for VTun VPN"
      + egress                 = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + from_port        = 0
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "-1"
              + security_groups  = []
              + self             = false
              + to_port          = 0
                # (1 unchanged attribute hidden)
            },
        ]
      + id                     = (known after apply)
      + ingress                = [
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + from_port        = 22
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 22
                # (1 unchanged attribute hidden)
            },
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + from_port        = 51820
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "udp"
              + security_groups  = []
              + self             = false
              + to_port          = 51820
                # (1 unchanged attribute hidden)
            },
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + from_port        = 5525
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 5525
                # (1 unchanged attribute hidden)
            },
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + from_port        = 5526
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 5526
                # (1 unchanged attribute hidden)
            },
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + from_port        = 9001
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 9001
                # (1 unchanged attribute hidden)
            },
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + from_port        = 9002
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 9002
                # (1 unchanged attribute hidden)
            },
          + {
              + cidr_blocks      = [
                  + "0.0.0.0/0",
                ]
              + from_port        = 9100
              + ipv6_cidr_blocks = []
              + prefix_list_ids  = []
              + protocol         = "tcp"
              + security_groups  = []
              + self             = false
              + to_port          = 9100
                # (1 unchanged attribute hidden)
            },
        ]
      + name                   = "KI5VMF-CLOUD-TUNNEL-vpn"
      + name_prefix            = (known after apply)
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags_all               = (known after apply)
      + vpc_id                 = (known after apply)
    }

  # cloudflare_record.record will be created
  + resource "cloudflare_record" "record" {
      + allow_overwrite = false
      + content         = (known after apply)
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "aredn-cloud-node"
      + proxiable       = (known after apply)
      + proxied         = false
      + ttl             = (known after apply)
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "1896d1131a72f9255386a78c50024864"
    }

  # tls_private_key.key will be created
  + resource "tls_private_key" "key" {
      + algorithm                     = "RSA"
      + ecdsa_curve                   = "P224"
      + id                            = (known after apply)
      + private_key_openssh           = (sensitive value)
      + private_key_pem               = (sensitive value)
      + private_key_pem_pkcs8         = (sensitive value)
      + public_key_fingerprint_md5    = (known after apply)
      + public_key_fingerprint_sha256 = (known after apply)
      + public_key_openssh            = (known after apply)
      + public_key_pem                = (known after apply)
      + rsa_bits                      = 4096
    }

Plan: 6 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + key       = (sensitive value)
  + public-ip = (known after apply)

Warning: Value for undeclared variable

The root module does not declare a variable named "map-config-json" but a
value was found in file "variables.tfvars". If you meant to use this value,
add a "variable" block to the configuration.

To silence these warnings, use TF_VAR_... environment variables to provide
certain "global" settings to all configurations in your organization. To
reduce the verbosity of these warnings, use the -compact-warnings option.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

@usa-reddragon-renovate-ce usa-reddragon-renovate-ce bot merged commit dad8a7d into main Dec 10, 2024
3 checks passed
@usa-reddragon-renovate-ce usa-reddragon-renovate-ce bot deleted the renovate/google-6.x branch December 10, 2024 07:03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants