Skip to content

Commit 998faf7

Browse files
Merge pull request #534 from hashicorp/tfe-release/1.1.x
TFE Release 1.1.x
2 parents 8422324 + 2425318 commit 998faf7

File tree

699 files changed

+93217
-86
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

699 files changed

+93217
-86
lines changed

content/terraform-docs-common/data/cloud-docs-nav-data.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@
9595
"path": "users-teams-organizations/api-tokens"
9696
},
9797
{
98-
"title": "Single sign on",
98+
"title": "Single sign on",
9999
"routes": [
100100
{
101101
"title": "Overview",

content/terraform-docs-common/docs/cloud-docs/api-docs/agents.mdx

Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,7 @@ This endpoint supports pagination [with standard URL query parameters](/terrafor
7474
| `filter[allowed_workspaces][name]` | **Optional.** Filters agent pools to those associated with the given workspace. The workspace must have permission to use the agent pool. Refer to [Scoping Agent Pools to Specific Workspaces](/terraform/cloud-docs/agents#scope-an-agent-pool-to-specific-workspaces). |
7575
| `filter[allowed_stacks][name]` | **Optional.** Filters agent pools to those associated with the given Stack. The Stack must have permission to use the agent pool. Only available in HCP Terraform, refer to [Scope agent pools](/terraform/cloud-docs/agents#scope-an-agent-pool) to learn more. |
7676
| `filter[allowed_projects][name]` | **Optional.** Filters agent pools to those associated with the given project. The project must have permission to use the agent pool. Refer to [Scoping Agent Pools to Specific Projects](/terraform/cloud-docs/agents#scope-an-agent-pool-to-specific-projects). |
77+
| `filter[allowed_modules][name]` | **Optional.** Filters agent pools to those configured to process jobs for the given registry module. Only available when the enterprise-testing feature is enabled. |
7778

7879

7980
### Response fields
@@ -168,6 +169,22 @@ curl \
168169
"type": "projects"
169170
}
170171
]
172+
},
173+
"allowed-modules": {
174+
"data": [
175+
{
176+
"id": "mod-Xf3VzW5zcRMMz12a",
177+
"type": "registry-modules"
178+
}
179+
]
180+
},
181+
"excluded-modules": {
182+
"data": [
183+
{
184+
"id": "mod-YgBnkR89vQWer34b",
185+
"type": "registry-modules"
186+
}
187+
]
171188
}
172189
},
173190
"links": {
@@ -396,6 +413,22 @@ curl \
396413
"type": "projects"
397414
}
398415
]
416+
},
417+
"allowed-modules": {
418+
"data": [
419+
{
420+
"id": "mod-Xf3VzW5zcRMMz12a",
421+
"type": "registry-modules"
422+
}
423+
]
424+
},
425+
"excluded-modules": {
426+
"data": [
427+
{
428+
"id": "mod-YgBnkR89vQWer34b",
429+
"type": "registry-modules"
430+
}
431+
]
399432
}
400433
},
401434
"links": {
@@ -510,6 +543,10 @@ Properties without a default value are required.
510543
| `data.relationships.excluded-workspaces.data.id` | string | | The ID of the workspace that is excluded from the scope of the agent pool. |
511544
| `data.relationships.excluded-stacks.data.type` | string | | Must be `"stacks"`. Only available in HCP Terraform. |
512545
| `data.relationships.excluded-stacks.data.id` | string | | The ID of the Stack that is excluded from the scope of the agent pool. Only available in HCP Terraform. |
546+
| `data.relationships.allowed-modules.data.type` | string | | Must be `"registry-modules"`. Only available when the enterprise-testing feature is enabled. |
547+
| `data.relationships.allowed-modules.data.id` | string | | The ID of the registry module that the agent pool is allowed to process tests for. Only available when the enterprise-testing feature is enabled. |
548+
| `data.relationships.excluded-modules.data.type` | string | | Must be `"registry-modules"`. Only available when the enterprise-testing feature is enabled. |
549+
| `data.relationships.excluded-modules.data.id` | string | | The ID of the registry module that the agent pool is excluded from processing tests for. Only available when the enterprise-testing feature is enabled. |
513550

514551
### Sample Payload
515552

@@ -561,6 +598,22 @@ Properties without a default value are required.
561598
"type": "projects"
562599
}
563600
]
601+
},
602+
"allowed-modules": {
603+
"data": [
604+
{
605+
"id": "mod-Xf3VzW5zcRMMz12a",
606+
"type": "registry-modules"
607+
}
608+
]
609+
},
610+
"excluded-modules": {
611+
"data": [
612+
{
613+
"id": "mod-YgBnkR89vQWer34b",
614+
"type": "registry-modules"
615+
}
616+
]
564617
}
565618
}
566619
}
@@ -647,6 +700,22 @@ curl \
647700
"type": "projects"
648701
}
649702
]
703+
},
704+
"allowed-modules": {
705+
"data": [
706+
{
707+
"id": "mod-Xf3VzW5zcRMMz12a",
708+
"type": "registry-modules"
709+
}
710+
]
711+
},
712+
"excluded-modules": {
713+
"data": [
714+
{
715+
"id": "mod-YgBnkR89vQWer34b",
716+
"type": "registry-modules"
717+
}
718+
]
650719
}
651720
},
652721
"links": {
@@ -691,6 +760,10 @@ Properties without a default value are required.
691760
| `data.relationships.excluded-workspaces.data.id` | string | | The ID of the workspace that is excluded from the scope of the agent pool. |
692761
| `data.relationships.excluded-stacks.data.type` | string | | Must be `"stacks"`. Only available in HCP Terraform. |
693762
| `data.relationships.excluded-stacks.data.id` | string | | The ID of the Stack that is excluded from the scope of the agent pool. Only available in HCP Terraform. |
763+
| `data.relationships.allowed-modules.data.type` | string | | Must be `"registry-modules"`. Only available when the enterprise-testing feature is enabled. |
764+
| `data.relationships.allowed-modules.data.id` | string | | The ID of the registry module that the agent pool is allowed to process tests for. Only available when the enterprise-testing feature is enabled. |
765+
| `data.relationships.excluded-modules.data.type` | string | | Must be `"registry-modules"`. Only available when the enterprise-testing feature is enabled. |
766+
| `data.relationships.excluded-modules.data.id` | string | | The ID of the registry module that the agent pool is excluded from processing tests for. Only available when the enterprise-testing feature is enabled. |
694767

695768
### Sample Payload
696769

@@ -742,6 +815,22 @@ Properties without a default value are required.
742815
"type": "projects"
743816
}
744817
]
818+
},
819+
"allowed-modules": {
820+
"data": [
821+
{
822+
"id": "mod-Xf3VzW5zcRMMz12a",
823+
"type": "registry-modules"
824+
}
825+
]
826+
},
827+
"excluded-modules": {
828+
"data": [
829+
{
830+
"id": "mod-YgBnkR89vQWer34b",
831+
"type": "registry-modules"
832+
}
833+
]
745834
}
746835
}
747836
}
@@ -836,6 +925,22 @@ $ curl \
836925
"type": "projects"
837926
}
838927
]
928+
},
929+
"allowed-modules": {
930+
"data": [
931+
{
932+
"id": "mod-Xf3VzW5zcRMMz12a",
933+
"type": "registry-modules"
934+
}
935+
]
936+
},
937+
"excluded-modules": {
938+
"data": [
939+
{
940+
"id": "mod-YgBnkR89vQWer34b",
941+
"type": "registry-modules"
942+
}
943+
]
839944
}
840945
},
841946
"links": {

content/terraform-docs-common/docs/cloud-docs/api-docs/applies.mdx

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,13 @@ description: >-
1616

1717
# Applies API reference
1818

19-
An apply represents the results of applying a Terraform workspace execution plan. <!-- BEGIN: TFC:only name:stacks-tfe --> If you are using a Stack and want to interact with Stack deployment runs, refer to [deployment runs](/terraform/cloud-docs/stacks/runs). <!-- END: TFC:only name:stacks-tfe -->
19+
An apply represents the results of applying a Terraform workspace execution plan. <!-- BEGIN: TFC:only name:stacks-tfe -->
20+
If you are using a Stack and want to interact with Stack deployment runs, refer to [deployment runs](/terraform/cloud-docs/stacks/runs). <!-- END: TFC:only name:stacks-tfe -->
2021

2122
## Attributes
2223

24+
The `/applies` endpoint has the following attributes.
25+
2326
### Apply States
2427

2528
You'll find the apply state in `data.attributes.status`, as one of the following values.

content/terraform-docs-common/docs/cloud-docs/api-docs/change-requests.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -319,3 +319,7 @@ $ curl \
319319
}
320320
}
321321
```
322+
323+
<!-- BEGIN: TFEnterprise:only name:explorer -->
324+
@include 'beta/explorer-limitations.mdx'
325+
<!-- END: TFEnterprise:only name:explorer -->

content/terraform-docs-common/docs/cloud-docs/api-docs/configuration-versions.mdx

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,16 +40,18 @@ description: >-
4040

4141
# Configuration versions API reference
4242

43-
-> **Note:** Before working with the runs or configuration versions APIs, read the [API-driven run workflow](/terraform/cloud-docs/workspaces/run/api) page, which includes both a full overview of this workflow and a walkthrough of a simple implementation of it.
43+
Before working with the runs or configuration versions APIs, read the [API-driven run workflow](/terraform/cloud-docs/workspaces/run/api) page. The page provides a full overview of the workflow and walks through a simplified implementation.
4444

45-
A configuration version (`configuration-version`) is a resource used to reference the uploaded configuration files on a workspace. It is associated with the run to use the uploaded configuration files for performing the plan and apply.
45+
Use the `configuration-version` endpoint to reference uploaded configuration files on a workspace. It is associated with the run to use the uploaded configuration files for performing the plan and apply.
4646

4747
You need read runs permission to list and view configuration versions for a workspace, and you need queue plans permission to create new configuration versions. Refer to the [permissions](/terraform/cloud-docs/users-teams-organizations/permissions/workspace) documentation for more details.
4848

4949
[permissions-citation]: #intentionally-unused---keep-for-maintainers
5050

5151
## Attributes
5252

53+
The `/configuration-version` endpoint has the following attributes.
54+
5355
### Configuration Version States
5456

5557
The configuration version state is found in `data.attributes.status`, and you can reference the following list of possible states.

content/terraform-docs-common/docs/cloud-docs/api-docs/explorer.mdx

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -888,3 +888,7 @@ all_checks_succeeded,checks_errored,checks_failed,checks_passed,checks_unknown,c
888888
"true","0","0","0","0","","run-rdoEKh2Gy3K6SbCZ","planned_and_finished","false","ws-j2sAeWRxou1b5HYf","0","","acme-corp","prj-V61QLE8tvs4NvVZG","Default Project","0","","0","0","1.5.7","","2023-10-17T21:56:45+00:00","candy distribution service","1.5.7","2023-12-13T15:48:16+00:00"
889889
"true","0","0","0","0","2023-08-18T16:24:59+00:00","run-9MmJaoQTvDCh5wUa","applied","true","ws-igUVNQSYVXRkhYuo","0","","acme-corp","prj-uU2xNqGeG86U9WgT","web","0","","3","3","1.4.5","acmecorp/api","2023-04-25T17:09:14+00:00","api-service","1.4.5","2023-12-13T15:29:03+00:00"
890890
```
891+
892+
<!-- BEGIN: TFEnterprise:only name:explorer -->
893+
@include 'beta/explorer-limitations.mdx'
894+
<!-- END: TFEnterprise:only name:explorer -->

content/terraform-docs-common/docs/cloud-docs/api-docs/index.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,9 +125,9 @@ The following entitlements are available:
125125
- `module-deprecations` - Allows an organization to mark a module version from the Private Registry as deprecated.
126126
- `module-revocations` - Allows an organization to mark a deprecated module version from the Private Registry as revoked.
127127
- `operations` — Allows an organization to perform runs within HCP Terraform. Affects the [runs][], [plans][], and [applies][] endpoints.
128-
- `policy-enforcement` — Allows an organization to use [Sentinel][]. Affects the [policies][], [policy sets][], and [policy checks][] endpoints.
128+
- `policy-enforcement` — Allows an organization to use [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel). Affects the [policies][], [policy sets][], and [policy checks][] endpoints.
129129
- `private-module-registry` — Allows an organization to publish and use modules with the [private module registry][]. Affects the [registry modules][] endpoints.
130-
- `private-policy-agents` - Allows an organization to ensure that HTTP enabled [Sentinel][] and OPA [policies][] can communicate with isolated, private, or on-premises infrastructure.
130+
- `private-policy-agents` - Allows an organization to ensure that HTTP enabled [Sentinel](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) and OPA [policies][] can communicate with isolated, private, or on-premises infrastructure.
131131
<!-- BEGIN: TFC:only name:premium -->
132132
- `private-run-tasks` - Allows an organization to ensure that [run tasks](/terraform/cloud-docs/workspaces/settings/run-tasks) can communicate with isolated, private, or on-premises infrastructure.
133133
- `private-vcs` - Allows a self-hosted HCP Terraform agent to [connect to a private VCS provider](/terraform/cloud-docs/vcs/private) without having to expose that provider to the public internet.

content/terraform-docs-common/docs/cloud-docs/api-docs/oauth-clients.mdx

Lines changed: 25 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,11 @@ This endpoint allows you to list VCS connections between an organization and a V
5959

6060
This endpoint supports pagination [with standard URL query parameters](/terraform/cloud-docs/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results.
6161

62-
| Parameter | Description |
63-
| -------------- | ----------------------------------------------------------------------------- |
64-
| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. |
65-
| `page[size]` | **Optional.** If omitted, the endpoint will return 20 oauth clients per page. |
62+
| Parameter | Description |
63+
| -------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------- |
64+
| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. |
65+
| `page[size]` | **Optional.** If omitted, the endpoint will return 20 oauth clients per page. |
66+
| `show_affected_workspaces` | **Optional.** If set to `true`, the endpoint will return names of up to 25 affected workspaces and the total number of affected workspaces for each oauth client. |
6667

6768
### Sample Request
6869

@@ -71,7 +72,7 @@ curl \
7172
--header "Authorization: Bearer $TOKEN" \
7273
--header "Content-Type: application/vnd.api+json" \
7374
--request GET \
74-
https://app.terraform.io/api/v2/organizations/my-organization/oauth-clients
75+
https://app.terraform.io/api/v2/organizations/my-organization/oauth-clients?show_affected_workspaces=true
7576
```
7677

7778
### Sample Response
@@ -93,7 +94,12 @@ curl \
9394
"api-url": "https://api.github.com",
9495
"key": null,
9596
"rsa-public-key": null,
96-
"organization-scoped": false
97+
"organization-scoped": false,
98+
"affected-workspaces": [
99+
"ws-1",
100+
"ws-2"
101+
],
102+
"affected-workspaces-count": 2
97103
},
98104
"relationships": {
99105
"organization": {
@@ -144,14 +150,20 @@ curl \
144150
| [200][] | [JSON API document][] (`type: "oauth-clients"`) | Success |
145151
| [404][] | [JSON API error object][] | OAuth Client not found, or user unauthorized to perform action |
146152

153+
### Query Parameters
154+
155+
| Parameter | Description |
156+
| -------------- | ------------------------------------------------------------------------------------------------------------------------------------------- |
157+
| `show_affected_workspaces` | **Optional.** If set to `true`, the endpoint will return names of up to 25 affected workspaces and the total number of affected workspaces. |
158+
147159
### Sample Request
148160

149161
```shell
150162
curl \
151163
--header "Authorization: Bearer $TOKEN" \
152164
--header "Content-Type: application/vnd.api+json" \
153165
--request GET \
154-
https://app.terraform.io/api/v2/oauth-clients/oc-XKFwG6ggfA9n7t1K
166+
https://app.terraform.io/api/v2/oauth-clients/oc-XKFwG6ggfA9n7t1K?show_affected_workspaces=true
155167
```
156168

157169
### Sample Response
@@ -172,7 +184,12 @@ curl \
172184
"api-url": "https://api.github.com",
173185
"key": null,
174186
"rsa-public-key": null,
175-
"organization-scoped": false
187+
"organization-scoped": false,
188+
"affected-workspaces": [
189+
"ws-1",
190+
"ws-2"
191+
],
192+
"affected-workspaces-count": 2
176193
},
177194
"relationships": {
178195
"organization": {

0 commit comments

Comments
 (0)