Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Terraform azuread to v2.50.0 #2149

Closed
wants to merge 1 commit into from
Closed

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Dec 13, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
azuread (source) required_provider minor 2.48.0 -> 2.50.0

Release Notes

hashicorp/terraform-provider-azuread (azuread)

v2.50.0

Compare Source

ENHANCEMENTS:

  • dependencies: updating to v0.68.0 of github.com/manicminer/hamilton (#​1382)
  • data.azuread_application - support looking up applications with the identifier_uri property [GH 1303]
  • azuread_conditional_access_policy - improve handling of the session_controls block (#​1382)

BUG FIXES:

  • data.azuread_service_principal - treat the display_name property case-insensitively (#​1381)
  • azuread_conditional_access_policy - fix a bug that could cause a persistent diff when setting certain properties in the session_controls block (#​1382)
  • azuread_user - don't overwrite the existing password in state, when a password change fails (#​1308)

v2.49.1

Compare Source

BUG FIXES:

  • data.azuread_group_role_management_policy - resolve a potential crash (#​1375)
  • azuread_group_role_management_policy - resolve a number of potential crashes (#​1375)
  • azuread_privileged_access_group_assignment_schedule - resolve a number of potential crashes (#​1375)
  • azuread_privileged_access_group_eligibility_schedule - resolve a number of potential crashes (#​1375)

v2.49.0

Compare Source

FEATURES:

  • New Data Source: azuread_group_role_management_policy (#​1327)
  • New Resource: azuread_group_role_management_policy (#​1327)
  • New Resource: azuread_privileged_access_group_assignment_schedule (#​1327)
  • New Resource: azuread_privileged_access_group_eligibility_schedule (#​1327)
  • New Resource: azuread_synchronization_job_provision_on_demand (#​1032)

ENHANCEMENTS:

  • data.azuread_group - support for the include_transitive_members property (#​1300)
  • azuread_application - relax validation for the identifier_uris property to allow more values (#​1351)
  • azuread_application_identifier_uri - relax validation for the identifier_uri property to allow more values (#​1351)
  • azuread_group - support the SkipExchangeInstantOn value for the behaviors property (#​1370)
  • azuread_user - relax validation for the employee_type property to allow more values (#​1328)

BUG FIXES:

  • azuread_application_pre_authorized - fix a destroy-time bug that could prevent deletion of the resource (#​1299)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot changed the title Update Terraform azuread to v2.46.0 Update Terraform azuread to v2.47.0 Dec 14, 2023
@renovate renovate bot force-pushed the renovate/azuread-2.x branch 2 times, most recently from d0926b8 to eee8244 Compare December 20, 2023 15:16
@hmcts-jenkins-a-to-c
Copy link
Contributor

hmcts-jenkins-a-to-c bot commented Feb 6, 2024

Plan Result

Plan: 0 to add, 10 to change, 0 to destroy.
  • Update
    • azurerm_key_vault_secret.flexible_secret["DATABASE"]
    • azurerm_key_vault_secret.flexible_secret["HOST"]
    • azurerm_key_vault_secret.flexible_secret["PASS"]
    • azurerm_key_vault_secret.flexible_secret["PORT"]
    • azurerm_key_vault_secret.flexible_secret["USER"]
    • azurerm_key_vault_secret.flexible_secret_staging["host"]
    • azurerm_key_vault_secret.flexible_secret_staging["name"]
    • azurerm_key_vault_secret.flexible_secret_staging["password"]
    • azurerm_key_vault_secret.flexible_secret_staging["port"]
    • azurerm_key_vault_secret.flexible_secret_staging["user"]
Change Result (Click me)
  # azurerm_key_vault_secret.flexible_secret["DATABASE"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-DATABASE/1e877432a45644dc957e4315c2fabc59"
        name                    = "blob-router-POSTGRES-FLEXIBLE-DATABASE"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret["HOST"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-HOST/6aa828f356264ec7b7edac57e53f7819"
        name                    = "blob-router-POSTGRES-FLEXIBLE-HOST"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret["PASS"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-PASS/7f3ae7fe77f54babb83858b88c3f123c"
        name                    = "blob-router-POSTGRES-FLEXIBLE-PASS"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret["PORT"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-PORT/258b796368ff4a5bae718e543eae24fa"
        name                    = "blob-router-POSTGRES-FLEXIBLE-PORT"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret["USER"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-FLEXIBLE-USER/9a55d421809b4beca1bdcd742c21f873"
        name                    = "blob-router-POSTGRES-FLEXIBLE-USER"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["host"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-host/51af603b98ee42aca7cf2631adc3bbe0"
        name                    = "blob-router-staging-flexible-db-host"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["name"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-name/1b3b5c5e0c554eb89a60aef83a27c8cb"
        name                    = "blob-router-staging-flexible-db-name"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["password"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-password/f4dab7117dd94d0c917122dc8264f07f"
        name                    = "blob-router-staging-flexible-db-password"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["port"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-port/3f6911f2652641e28c00c0f7617e8352"
        name                    = "blob-router-staging-flexible-db-port"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["user"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-03-19T09:13:54Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-user/dceb88eefa2e4175b5479e9433a0a42c"
        name                    = "blob-router-staging-flexible-db-user"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

Plan: 0 to add, 10 to change, 0 to destroy.

@renovate renovate bot force-pushed the renovate/azuread-2.x branch 2 times, most recently from 092a126 to e04d38d Compare February 7, 2024 14:22
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview February 7, 2024 15:17 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview March 4, 2024 15:42 Abandoned
@renovate renovate bot force-pushed the renovate/azuread-2.x branch 2 times, most recently from d922676 to bf20c03 Compare March 5, 2024 12:52
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview March 5, 2024 13:07 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview March 12, 2024 18:52 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview March 12, 2024 19:23 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview March 14, 2024 04:03 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview March 19, 2024 09:19 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview March 21, 2024 10:46 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 11, 2024 12:25 Abandoned
@renovate renovate bot changed the title Update Terraform azuread to v2.47.0 Update Terraform azuread to v2.48.0 Apr 12, 2024
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 12, 2024 02:15 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 17, 2024 13:04 Abandoned
@renovate renovate bot force-pushed the renovate/azuread-2.x branch 2 times, most recently from 943d704 to c22a3f3 Compare April 26, 2024 10:10
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 26, 2024 10:21 Abandoned
@renovate renovate bot changed the title Update Terraform azuread to v2.48.0 Update Terraform azuread to v2.49.0 May 9, 2024
@renovate renovate bot changed the title Update Terraform azuread to v2.49.0 Update Terraform azuread to v2.49.1 May 13, 2024
@renovate renovate bot force-pushed the renovate/azuread-2.x branch 2 times, most recently from 795ca10 to 88f6b45 Compare May 17, 2024 02:38
@renovate renovate bot changed the title Update Terraform azuread to v2.49.1 Update Terraform azuread to v2.50.0 May 17, 2024
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview May 24, 2024 09:12 Abandoned
Copy link
Contributor Author

renovate bot commented Jun 5, 2024

Renovate Ignore Notification

Because you closed this PR without merging, Renovate will ignore this update (2.50.0). You will get a PR once a newer version is released. To ignore this dependency forever, add it to the ignoreDeps array of your Renovate config.

If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR.

@renovate renovate bot deleted the renovate/azuread-2.x branch June 5, 2024 14:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant