Commit Graph

538 Commits

Author SHA1 Message Date
Brandon Croft
be5984d664 Merge pull request #32004 from hashicorp/brandonc/nested_attr_sensitive
fix: don't reveal nested attributes with sensitive schema
2022-11-02 16:18:04 -06:00
Laura Pacilio
ec42b167d7 fix broken links 2022-10-31 14:46:15 -04:00
Tom Bamford
ff68c8d129 Merge pull request #31966 from kschu91/feature/azure-generic-oidc
backend/azurerm: add support for generic OIDC authentication
2022-10-31 11:25:36 +00:00
Liam Nesteroff
5957d2657a Update GCS backend docs for TF >=0.12 (#32065)
* Update gcs.mdx

Updated GCS remote backend to include the >=0.12 remote backend data source formatting (incl .output before output name)

* Update gcs.mdx

removed old data source example

* Update gcs.mdx

updated to local_file and output->outputs

* Update gcs.mdx

removed "outputs" from the pre 0.12 ref
2022-10-28 22:18:25 +01:00
Laura Pacilio
2aaaf28b75 Merge pull request #31830 from sdinay/patch-2
Update links to deprecated aws_s3_bucket_object to aws_s3_object
2022-10-25 11:17:41 -04:00
Laura Pacilio
20b3e8e5a1 Merge pull request #31792 from mferraroni/doc-s3-fix
Modifies permissions needed to use s3 with dynamoDb locks
2022-10-25 11:15:54 -04:00
Laura Pacilio
fbfe5b5a87 Merge pull request #31508 from wzyboy/docs/unknwon-value
docs: fix typo regarding unknown values
2022-10-25 11:07:05 -04:00
Laura Pacilio
c3c6f8327f Merge pull request #31149 from hashicorp/docs-for-each-list-toset
fix(docs): change set to list when recommending using toset()
2022-10-25 11:04:19 -04:00
Brandon Croft
bd744ad4e9 Unify all sensitive value plan output as "(sensitive value)"
Previously, there was mixed usage of "(sensitive)" and "(sensitive value)" and even though it was more common to see "(sensitive)", the thought is that it's a value we are hiding rather than describing something already shown.
2022-10-24 12:50:46 -06:00
Kevin Wang
03e262a70b chore: rewrite internal redirects (#32038) 2022-10-20 11:31:55 -04:00
Laura Pacilio
cb975a5fff Revert "Remove future-facing statements"
This reverts commit 0a7e221a49.
2022-10-14 15:00:22 -04:00
Laura Pacilio
0a7e221a49 Remove future-facing statements 2022-10-14 14:42:40 -04:00
Tom Bamford
0dac887547 Docs for azurerm generic OIDC 2022-10-12 13:24:49 +01:00
Sarah French
89ef27d3b4 Add Private Service Connect endpoint support to GCS backend (#31967)
* Add support for `storage_custom_endpoint` in `gcs` backend

* Add documentation for new `storage_custom_endpoint` endpoint

* Empty commit to trigger Vercel deployment
2022-10-11 18:57:09 +01:00
Matthew Garrell
03bff99caa Merge pull request #31954 from hashicorp/mg_no_code_prov_followup
Adding mention of no-code to Creating Modules section of TF Language docs
2022-10-06 12:00:39 -04:00
Matthew Garrell
a50d8cfc11 Adding mention of no-code to Modules section of TF Language docs 2022-10-06 11:53:53 -04:00
Laura Pacilio
c8d8536160 Add callout to Continuous Validation 2022-10-05 22:32:37 -04:00
Laura Pacilio
8258070fd5 Update website/docs/language/state/backends.mdx 2022-10-05 13:43:45 -04:00
Laura Pacilio
97c628044a Update website/docs/language/state/backends.mdx 2022-10-05 13:42:22 -04:00
Laura Pacilio
bed5650e2f Update backends.mdx 2022-10-05 13:33:30 -04:00
Sarah French
d43ec0f30f Add customer-managed encryption key (KMS) support to GCS backend (#31786)
* Add ability to use customer-managed KMS key to encrypt state, add acceptance tests

* Change test names for different encrpytion methods

* Commit files updated by `go mod tidy`

* Add guard against missing ENVs to `setupKmsKey` func

* Update KMS setup function to get credentials from ENVs

* Update tests to not include zero-values in config

This means that default values are supplied later by TF instead of supplied as config from the user

This also avoids issues related to making field conflicts explicit with `ConflictsWith`

* Make `encryption_key` & `kms_encryption_key` conflicting fields

Removing the Default from `encryption_key` does not appear to be a breaking change when tested manually

* Add ability to set `kms_encryption_key` via ENV

* Refactor `encryption_key` to use `DefaultFunc` to access ENV, if set

* Remove comments

* Update `gcs` backend docs & descriptions in schema

* Update `gcs` backend docs to include information on encryption methods

* Apply technical writing suggestions from code review

Co-authored-by: Matthew Garrell <69917312+mgarrell777@users.noreply.github.com>

* Update documentation to remove passive voice

* Change use of context in tests, add inline comment, update logs

* Remove use of `ReadPathOrContents` for new field

Co-authored-by: Matthew Garrell <69917312+mgarrell777@users.noreply.github.com>
2022-10-04 10:10:49 +01:00
Craig Wright
e7fb895c46 Merge pull request #31876 from zisom-hc/patch-1
Update custom-conditions.mdx
2022-10-03 16:28:01 -07:00
Martin Atkins
f260ed1177 website: Remove warning that yamlencode is experimental
We originally included this warning because the go-cty-yaml module wasn't
yet stable and it was also not extensively tested so it wasn't yet clear
if its behavior would need to change in some less common cases we hadn't
tested so far.

However, go-cty-yaml had its v1.0.0 release some time ago and is now
committed to preserving its current Marshal output unless it is found to
be non-compliant with the YAML 1.2 specification. This doc change means
that Terraform's yamlencode is now adopting a similar posture:
 - The exact style details produced by the function for a particular input
   are now frozen. It'll change only if we find that the function is
   producing output that isn't valid per the YAML spec.
 - If someone finds a YAML parser that cannot parse what yamlencode
   produces but what it produces is valid per the YAML 1.2 spec, we'll
   expect the parser to be corrected to better support the spec rather
   than changing the yamlencode output.

There may be pragmatic exceptions if we encounter a situation we cannot
anticipate yet, but the above will be our general rule. This is really
just a specialization of the spirit of the v1.x Compatibility Promises,
tailored specifically to this function.
2022-09-30 09:08:12 -07:00
zisom-hc
d08fcd63db Update custom-conditions.mdx
Made a change to code example within the *Preconditions and Postconditions* section so that it technically makes sense; prior it was missing the data resource that was being called within the precondition lifecycle event on line 135, and the aws_instance resource was not utilizing the ami being provided by the data source in line 129, so i changed that as well.
2022-09-26 14:53:47 -07:00
Laura Pacilio
a8ea377e7f Merge pull request #31849 from hashicorp/workspaces-confusion-fixes
Update workspace documentation
2022-09-23 17:46:32 -04:00
Laura Pacilio
0471c80ebe Update website/docs/language/state/workspaces.mdx 2022-09-23 17:25:24 -04:00
Laura Pacilio
2ea3765fa6 Update website/docs/language/state/workspaces.mdx 2022-09-23 17:24:54 -04:00
Laura Pacilio
6753fb5476 Update website/docs/language/state/workspaces.mdx 2022-09-23 17:24:39 -04:00
Laura Pacilio
776c25777d Update website/docs/language/state/workspaces.mdx 2022-09-23 17:17:06 -04:00
Matthew Garrell
1e6f091976 Merge pull request #31598 from bobsut/patch-1
insert missing infinitive particle
2022-09-23 08:49:18 -04:00
Laura Pacilio
35a5e92687 language fix 2022-09-22 19:07:55 -04:00
Laura Pacilio
2fc8289cf1 More updates to workspaces in language 2022-09-22 19:03:42 -04:00
Laura Pacilio
6c34047efa Update workspace documentation 2022-09-22 18:50:08 -04:00
koki-develop
d5df330696 fixed typo: startsswith -> startswith 2022-09-22 08:53:11 +09:00
Laura Pacilio
9582cc2d0f Remove unnecessary version note 2022-09-20 16:25:51 -04:00
S Dinay
bbf60cdd65 Update links aws_s3_bucket_object to aws_s3_bucket
The remote-state-data documentation page refers to the aws_s3_bucket_object resource and data which is deprecated. The documentation says to use aws_s3_object instead. This change updates the links for the S3 object solution for remote state.
2022-09-20 11:11:37 -07:00
Martin Atkins
65ad73fe03 website: Tombstone callout for the v1.3 removed backends
We've removed the main documentation pages for the backends that are
removed in Terraform v1.3, but we'll leave a small callout note so that
the backend names are still reachable through our search index once the
v1.3 docs are the active version.

The primary goal here is to help folks who have inherited configurations
using older versions of Terraform to learn about features they see in those
configurations, so the main thing here is the link to the older release
docs which include those. However, this is also a good opportunity to link
to the upgrade guide content which describes some possible migration
paths away from these removed backends.
2022-09-16 10:54:30 -07:00
Bryce Kalow
b54017ef83 website: content updates for developer (#31779)
Co-authored-by: Matthew Garrell <69917312+mgarrell777@users.noreply.github.com>
Co-authored-by: Laura Pacilio <83350965+laurapacilio@users.noreply.github.com>
Co-authored-by: Kevin Wang <kwangsan@gmail.com>
Co-authored-by: Judith Malnick <judith@hashicorp.com>
Co-authored-by: Martin Atkins <mart@degeneration.co.uk>
Co-authored-by: HashiBot <62622282+hashibot-web@users.noreply.github.com>
2022-09-15 15:54:13 -05:00
Matteo Ferraroni
0900b787f8 Modifies permissions needed to use s3 with dynamoDb locks 2022-09-14 21:06:39 -04:00
Laura Pacilio
ee61929a9c update note on provisioners page 2022-09-14 18:51:43 -04:00
Laura Pacilio
a891119b61 Remove legacy provisioners from docs 2022-09-14 18:43:48 -04:00
Martin Atkins
a30294372f website: Version-specific upgrade guides (v1.4 branch)
Before our website allowed selecting from older versions of Terraform to
see older documentation we needed to preserve all of the historical
upgrade guides in the latest release branch so that they'd stay available
on the website.

However, our new strategy is for each release to have its own separate
set of documentation selectable using a global version selector. We should
therefore now have only the upgrade guide for the each minor release
on its release branch, with the upgrade guides for earlier releases
instead maintained on their own branches.

However, our v1.1 branch is, as a matter of pragmatism, serving as the home
for the "v1.1 and earlier" documentation, and so there will continue to
be multiple upgrade guides on that branch. For that reason, we're
preserving the URL scheme "upgrade-guides" (plural) even though the URL
now points to only a single version upgrade guide because that causes
readers to land in the correct place if they are on a modern version's
upgrade guide page and they use the version selector to choose the
"v1.1 and earlier" option.
2022-09-14 13:37:04 -07:00
Laura Pacilio
488bbd80fc Merge pull request #31484 from hashicorp/update-cloud-block-pages
Update Cloud Block Docs
2022-09-09 15:47:35 -04:00
Laura Pacilio
039f884df9 Merge pull request #31547 from hashicorp/clarify-backend-state-storage
Add more context about local backend configuration state file
2022-09-09 15:45:32 -04:00
James Bardin
522556534d remove deprecated backends (#31711)
* remove deprecated backends

* remove backend docs

Remove references to deprecated backends from docs.
2022-08-31 10:17:07 +01:00
Martin Atkins
2ee9589650 lang/funcs: "timecmp" function
This is a complement to "timestamp" and "timeadd" which allows
establishing the ordering of two different timestamps while taking into
account their timezone offsets, which isn't otherwise possible using the
existing primitives in the Terraform language.
2022-08-25 10:15:42 -07:00
Tocho Tochev
4e506d5fda docs: Fix condition example 2022-08-21 23:54:37 +03:00
Alisdair McDiarmid
81b50892ed Update references.mdx 2022-08-17 09:02:37 -04:00
Alisdair McDiarmid
d7377ca141 Merge branch 'main' into update-path-cwd 2022-08-17 08:58:26 -04:00
Alisdair McDiarmid
4960e6aeba Merge pull request #31634 from hashicorp/alisdair/optional-object-attribute-explicit-null
typeexpr: Replace null attr values with defaults
2022-08-17 08:54:21 -04:00