Commit Graph

804 Commits

Author SHA1 Message Date
Liam Nesteroff
5957d2657a Update GCS backend docs for TF >=0.12 (#32065)
* Update gcs.mdx

Updated GCS remote backend to include the >=0.12 remote backend data source formatting (incl .output before output name)

* Update gcs.mdx

removed old data source example

* Update gcs.mdx

updated to local_file and output->outputs

* Update gcs.mdx

removed "outputs" from the pre 0.12 ref
2022-10-28 22:18:25 +01:00
Laura Pacilio
2aaaf28b75 Merge pull request #31830 from sdinay/patch-2
Update links to deprecated aws_s3_bucket_object to aws_s3_object
2022-10-25 11:17:41 -04:00
Laura Pacilio
20b3e8e5a1 Merge pull request #31792 from mferraroni/doc-s3-fix
Modifies permissions needed to use s3 with dynamoDb locks
2022-10-25 11:15:54 -04:00
Laura Pacilio
fbfe5b5a87 Merge pull request #31508 from wzyboy/docs/unknwon-value
docs: fix typo regarding unknown values
2022-10-25 11:07:05 -04:00
Laura Pacilio
c3c6f8327f Merge pull request #31149 from hashicorp/docs-for-each-list-toset
fix(docs): change set to list when recommending using toset()
2022-10-25 11:04:19 -04:00
Ben Drucker
81e620c961 docs: update splat expressions in directives 2022-10-24 20:09:22 -07:00
Igor Venturelli
6f335f233a Fixing s3.mdx on Delegating Access 2022-10-24 19:33:46 -03:00
Laura Pacilio
8b62ab2423 Update website/docs/language/providers/configuration.mdx 2022-10-24 17:46:25 -04:00
Laura Pacilio
0a12ffb683 Update website/docs/language/providers/configuration.mdx 2022-10-24 17:45:59 -04:00
Laura Pacilio
c8a023c398 Update website/docs/language/modules/syntax.mdx 2022-10-24 17:44:41 -04:00
Laura Pacilio
067fac3572 Update website/docs/language/expressions/for.mdx 2022-10-24 17:43:48 -04:00
Laura Pacilio
8ca918d4a5 Update website/docs/language/data-sources/index.mdx 2022-10-24 17:42:57 -04:00
Brandon Croft
bd744ad4e9 Unify all sensitive value plan output as "(sensitive value)"
Previously, there was mixed usage of "(sensitive)" and "(sensitive value)" and even though it was more common to see "(sensitive)", the thought is that it's a value we are hiding rather than describing something already shown.
2022-10-24 12:50:46 -06:00
Albert Lloveras
095368b4b4 PR Feedback
Co-authored-by: Matthew Garrell <69917312+mgarrell777@users.noreply.github.com>
2022-10-21 09:48:22 +11:00
Kevin Wang
03e262a70b chore: rewrite internal redirects (#32038) 2022-10-20 11:31:55 -04:00
Laura Pacilio
7f6cbc83f7 Update website/docs/language/providers/requirements.mdx 2022-10-17 19:07:17 -04:00
Laura Pacilio
31a9fde330 take out currently 2022-10-17 19:00:19 -04:00
Laura Pacilio
9f77c954ec Update website/docs/language/expressions/for.mdx 2022-10-17 18:31:31 -04:00
Laura Pacilio
cf47c71291 Revert "Revert "Remove future-facing statements""
This reverts commit cb975a5fff.
2022-10-14 16:14:20 -04:00
Laura Pacilio
cb975a5fff Revert "Remove future-facing statements"
This reverts commit 0a7e221a49.
2022-10-14 15:00:22 -04:00
Laura Pacilio
0a7e221a49 Remove future-facing statements 2022-10-14 14:42:40 -04:00
Albert Lloveras
9bca926104 . 2022-10-13 19:59:17 +11:00
Albert Lloveras
cf6ffbcc91 . 2022-10-13 19:59:10 +11:00
Albert Lloveras
8feceaf334 Document that NETRC is also respected
The current documentation wording seems to suggest that the only `.netrc` file that will be considered by Terraform is the one sitting in the current user's HOME directory. However, unless I am missing something, Terraform uses `go-getter` to fetch remote modules which mean that the `NETRC` environment variable will also be respected and, in fact, will take precedence over any `.netrc` file on the user's home directory.

See: f7a8c48a1f/netrc.go (L23-L36)
2022-10-13 19:49:10 +11:00
Peter Junos
9016e8d607 Replace pipe with html entity 2022-10-13 10:21:47 +02:00
Tom Bamford
0dac887547 Docs for azurerm generic OIDC 2022-10-12 13:24:49 +01:00
sed-i
42e689376a Add example for using cloud-config in place of file provisioners 2022-10-12 13:35:58 +03:00
Sarah French
89ef27d3b4 Add Private Service Connect endpoint support to GCS backend (#31967)
* Add support for `storage_custom_endpoint` in `gcs` backend

* Add documentation for new `storage_custom_endpoint` endpoint

* Empty commit to trigger Vercel deployment
2022-10-11 18:57:09 +01:00
Peter Junos
6ece575c53 Fix regex pattern for more alternatives
During refactoring, there was a backslash added to `|` character in
terraform regex.

Fix that and return just `x|y` - that's the correct usage.
2022-10-10 17:36:38 +02:00
Matthew Garrell
03bff99caa Merge pull request #31954 from hashicorp/mg_no_code_prov_followup
Adding mention of no-code to Creating Modules section of TF Language docs
2022-10-06 12:00:39 -04:00
Matthew Garrell
a50d8cfc11 Adding mention of no-code to Modules section of TF Language docs 2022-10-06 11:53:53 -04:00
Laura Pacilio
c8d8536160 Add callout to Continuous Validation 2022-10-05 22:32:37 -04:00
Laura Pacilio
8258070fd5 Update website/docs/language/state/backends.mdx 2022-10-05 13:43:45 -04:00
Laura Pacilio
97c628044a Update website/docs/language/state/backends.mdx 2022-10-05 13:42:22 -04:00
Laura Pacilio
bed5650e2f Update backends.mdx 2022-10-05 13:33:30 -04:00
Sarah French
d43ec0f30f Add customer-managed encryption key (KMS) support to GCS backend (#31786)
* Add ability to use customer-managed KMS key to encrypt state, add acceptance tests

* Change test names for different encrpytion methods

* Commit files updated by `go mod tidy`

* Add guard against missing ENVs to `setupKmsKey` func

* Update KMS setup function to get credentials from ENVs

* Update tests to not include zero-values in config

This means that default values are supplied later by TF instead of supplied as config from the user

This also avoids issues related to making field conflicts explicit with `ConflictsWith`

* Make `encryption_key` & `kms_encryption_key` conflicting fields

Removing the Default from `encryption_key` does not appear to be a breaking change when tested manually

* Add ability to set `kms_encryption_key` via ENV

* Refactor `encryption_key` to use `DefaultFunc` to access ENV, if set

* Remove comments

* Update `gcs` backend docs & descriptions in schema

* Update `gcs` backend docs to include information on encryption methods

* Apply technical writing suggestions from code review

Co-authored-by: Matthew Garrell <69917312+mgarrell777@users.noreply.github.com>

* Update documentation to remove passive voice

* Change use of context in tests, add inline comment, update logs

* Remove use of `ReadPathOrContents` for new field

Co-authored-by: Matthew Garrell <69917312+mgarrell777@users.noreply.github.com>
2022-10-04 10:10:49 +01:00
Craig Wright
e7fb895c46 Merge pull request #31876 from zisom-hc/patch-1
Update custom-conditions.mdx
2022-10-03 16:28:01 -07:00
Rob Pickerill
5d2e888e96 update setsubtract examples to include toset notation 2022-10-01 20:45:04 +01:00
Martin Atkins
f260ed1177 website: Remove warning that yamlencode is experimental
We originally included this warning because the go-cty-yaml module wasn't
yet stable and it was also not extensively tested so it wasn't yet clear
if its behavior would need to change in some less common cases we hadn't
tested so far.

However, go-cty-yaml had its v1.0.0 release some time ago and is now
committed to preserving its current Marshal output unless it is found to
be non-compliant with the YAML 1.2 specification. This doc change means
that Terraform's yamlencode is now adopting a similar posture:
 - The exact style details produced by the function for a particular input
   are now frozen. It'll change only if we find that the function is
   producing output that isn't valid per the YAML spec.
 - If someone finds a YAML parser that cannot parse what yamlencode
   produces but what it produces is valid per the YAML 1.2 spec, we'll
   expect the parser to be corrected to better support the spec rather
   than changing the yamlencode output.

There may be pragmatic exceptions if we encounter a situation we cannot
anticipate yet, but the above will be our general rule. This is really
just a specialization of the spirit of the v1.x Compatibility Promises,
tailored specifically to this function.
2022-09-30 09:08:12 -07:00
zisom-hc
d08fcd63db Update custom-conditions.mdx
Made a change to code example within the *Preconditions and Postconditions* section so that it technically makes sense; prior it was missing the data resource that was being called within the precondition lifecycle event on line 135, and the aws_instance resource was not utilizing the ami being provided by the data source in line 129, so i changed that as well.
2022-09-26 14:53:47 -07:00
Laura Pacilio
a8ea377e7f Merge pull request #31849 from hashicorp/workspaces-confusion-fixes
Update workspace documentation
2022-09-23 17:46:32 -04:00
Laura Pacilio
0471c80ebe Update website/docs/language/state/workspaces.mdx 2022-09-23 17:25:24 -04:00
Laura Pacilio
2ea3765fa6 Update website/docs/language/state/workspaces.mdx 2022-09-23 17:24:54 -04:00
Laura Pacilio
6753fb5476 Update website/docs/language/state/workspaces.mdx 2022-09-23 17:24:39 -04:00
Laura Pacilio
776c25777d Update website/docs/language/state/workspaces.mdx 2022-09-23 17:17:06 -04:00
Matthew Garrell
1e6f091976 Merge pull request #31598 from bobsut/patch-1
insert missing infinitive particle
2022-09-23 08:49:18 -04:00
Laura Pacilio
35a5e92687 language fix 2022-09-22 19:07:55 -04:00
Laura Pacilio
2fc8289cf1 More updates to workspaces in language 2022-09-22 19:03:42 -04:00
Laura Pacilio
6c34047efa Update workspace documentation 2022-09-22 18:50:08 -04:00
koki-develop
d5df330696 fixed typo: startsswith -> startswith 2022-09-22 08:53:11 +09:00