Skip to content

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Nov 1, 2023

Bumps hashicorp/setup-terraform from 2 to 3.

Release notes

Sourced from hashicorp/setup-terraform's releases.

v3.0.0

NOTES:

  • Updated default runtime to node20 (#346)
  • The wrapper around the installed Terraform binary has been fixed to return the exact STDOUT and STDERR from Terraform when executing commands. Previous versions of setup-terraform may have required workarounds to process the STDOUT in bash, such as filtering out the first line or selectively parsing STDOUT with jq. These workarounds may need to be adjusted with v3.0.0, which will now return just the STDOUT/STDERR from Terraform with no errant characters/statements. (#367)

BUG FIXES:

  • Fixed malformed stdout when wrapper is enabled (#367)

v2.0.3

What's Changed

NOTES

Full Changelog: hashicorp/setup-terraform@v2.0.2...v2.0.3

v2.0.2

What's Changed

NOTES

INTERNAL

Full Changelog: hashicorp/setup-terraform@v2.0.1...v2.0.2

v2.0.1

What's Changed

ENHANCEMENTS

BUG FIXES

INTERNAL

... (truncated)

Changelog

Sourced from hashicorp/setup-terraform's changelog.

3.0.0 (2023-10-30)

NOTES:

  • Updated default runtime to node20 (#346)
  • The wrapper around the installed Terraform binary has been fixed to return the exact STDOUT and STDERR from Terraform when executing commands. Previous versions of setup-terraform may have required workarounds to process the STDOUT in bash, such as filtering out the first line or selectively parsing STDOUT with jq. These workarounds may need to be adjusted with v3.0.0, which will now return just the STDOUT/STDERR from Terraform with no errant characters/statements. (#367)

BUG FIXES:

  • Fixed malformed stdout when wrapper is enabled (#367)

[2.0.3] (2022-11-01)

NOTES

  • Reduced occurrences of GitHub Actions warnings for setting output #247

[2.0.2] (2022-10-12)

BUG FIXES

INTERNAL

[2.0.1] (2022-10-12)

ENHANCEMENTS

BUG FIXES

INTERNAL

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

tomasbasham and others added 9 commits October 20, 2023 00:06
A VPC is a virtual network within GCP, spanning all available
regions. It provides networking for Compute Engine virtual machines,
Kubernetes Engine clusters and containers, and the Google App Engine
environment.

A VPC can be further divided into subnetworks - providing isolated
address spaces for resources - and can provide private Google service
network connections for resources such as managed Redis.
VPC firewall rules either allow or deny network traffic to or from
virtual machine (VM) instances in a VPC network. Enabled VPC firewall
rules are always enforced, protecting instances regardless of their
configuration and operating system, even if they have not started up.

Every VPC network functions as a distributed firewall. While firewall
rules are defined at the network level, connections are allowed or
denied on a per-instance basis.

Common firewall rules (HTTP, HTTPS, SSH) are enabled by default but must
be configured to permit source addresses access. This effectively means
that no traffic may enter the network unless explicitly permitted.
Bumps [hashicorp/setup-terraform](https://github.com/hashicorp/setup-terraform) from 2 to 3.
- [Release notes](https://github.com/hashicorp/setup-terraform/releases)
- [Changelog](https://github.com/hashicorp/setup-terraform/blob/main/CHANGELOG.md)
- [Commits](hashicorp/setup-terraform@v2...v3)

---
updated-dependencies:
- dependency-name: hashicorp/setup-terraform
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot requested a review from a team as a code owner November 1, 2023 09:39
@dependabot dependabot bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels Nov 1, 2023
@github-actions
Copy link

github-actions bot commented Nov 1, 2023

Terraform Format and Style success

Formatting Output
No difference

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants