generated from hmcts/spring-boot-template
-
Notifications
You must be signed in to change notification settings - Fork 1
Update Terraform azurerm to v4.57.0 #110
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
renovate
wants to merge
1
commit into
master
Choose a base branch
from
renovate/azurerm-4.x
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Contributor
Plan Result (aat)
Change Result (Click me) # azurerm_key_vault_secret.flexible_secret["DATABASE"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T09:57:05Z" -> (known after apply)
id = "https://fact-kv-aat.vault.azure.net/secrets/data-api-POSTGRES-DATABASE/5fe9e2f3706c40d297eb73056f798184"
name = "data-api-POSTGRES-DATABASE"
tags = {
"application" = "find-a-court-or-tribunal"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "staging"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret["HOST"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T09:57:05Z" -> (known after apply)
id = "https://fact-kv-aat.vault.azure.net/secrets/data-api-POSTGRES-HOST/20053128bea8460abb4cc7c98495e1e1"
name = "data-api-POSTGRES-HOST"
tags = {
"application" = "find-a-court-or-tribunal"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "staging"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret["PASS"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T09:57:05Z" -> (known after apply)
id = "https://fact-kv-aat.vault.azure.net/secrets/data-api-POSTGRES-PASS/aed26a9687194780be5cf3f08196d86c"
name = "data-api-POSTGRES-PASS"
tags = {
"application" = "find-a-court-or-tribunal"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "staging"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret["PORT"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T09:57:05Z" -> (known after apply)
id = "https://fact-kv-aat.vault.azure.net/secrets/data-api-POSTGRES-PORT/b8d1610eb73e42dc86d2a0ed02f00e3c"
name = "data-api-POSTGRES-PORT"
tags = {
"application" = "find-a-court-or-tribunal"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "staging"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret["USER"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T09:57:05Z" -> (known after apply)
id = "https://fact-kv-aat.vault.azure.net/secrets/data-api-POSTGRES-USER/3e468586372249df91306e52cd96a673"
name = "data-api-POSTGRES-USER"
tags = {
"application" = "find-a-court-or-tribunal"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "staging"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.storage_account_connection_string_secret will be updated in-place
~ resource "azurerm_key_vault_secret" "storage_account_connection_string_secret" {
~ expiration_date = "2027-12-19T09:57:15Z" -> (known after apply)
id = "https://fact-kv-aat.vault.azure.net/secrets/storage-account-connection-string/7d71c9e3ea714f98839ec081591976e0"
name = "storage-account-connection-string"
tags = {
"application" = "find-a-court-or-tribunal"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "staging"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api Storage account"
}
# (10 unchanged attributes hidden)
}
# module.storage_account.azurerm_storage_account.storage_account will be updated in-place
~ resource "azurerm_storage_account" "storage_account" {
id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/fact-aat/providers/Microsoft.Storage/storageAccounts/factsaaat"
name = "factsaaat"
tags = {
"application" = "find-a-court-or-tribunal"
"autoShutdown" = "true"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "staging"
"managedBy" = "Find a Court or Tribunal"
}
# (97 unchanged attributes hidden)
+ network_rules {
+ bypass = [
+ "AzureServices",
]
+ default_action = "Allow"
}
# (3 unchanged blocks hidden)
}
Plan: 0 to add, 7 to change, 0 to destroy. |
Contributor
Plan Result (prod)
Change Result (Click me) # azurerm_key_vault_secret.flexible_secret["DATABASE"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T10:01:11Z" -> (known after apply)
id = "https://fact-kv-prod.vault.azure.net/secrets/data-api-POSTGRES-DATABASE/ec9975470c1e40ebabb2f307dd746100"
name = "data-api-POSTGRES-DATABASE"
tags = {
"application" = "find-a-court-or-tribunal"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "production"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret["HOST"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T10:01:11Z" -> (known after apply)
id = "https://fact-kv-prod.vault.azure.net/secrets/data-api-POSTGRES-HOST/a96c1a916c754ce59697f975270818e0"
name = "data-api-POSTGRES-HOST"
tags = {
"application" = "find-a-court-or-tribunal"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "production"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret["PASS"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T10:01:11Z" -> (known after apply)
id = "https://fact-kv-prod.vault.azure.net/secrets/data-api-POSTGRES-PASS/89227e22920440298440aff3f66fa154"
name = "data-api-POSTGRES-PASS"
tags = {
"application" = "find-a-court-or-tribunal"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "production"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret["PORT"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T10:01:11Z" -> (known after apply)
id = "https://fact-kv-prod.vault.azure.net/secrets/data-api-POSTGRES-PORT/0e66f4133fdf403b8c6dc817c22170ad"
name = "data-api-POSTGRES-PORT"
tags = {
"application" = "find-a-court-or-tribunal"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "production"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.flexible_secret["USER"] will be updated in-place
~ resource "azurerm_key_vault_secret" "flexible_secret" {
~ expiration_date = "2027-12-19T10:01:11Z" -> (known after apply)
id = "https://fact-kv-prod.vault.azure.net/secrets/data-api-POSTGRES-USER/e780bebe95cf48f48548de704b7a7c88"
name = "data-api-POSTGRES-USER"
tags = {
"application" = "find-a-court-or-tribunal"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "production"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api PostgreSQL"
}
# (10 unchanged attributes hidden)
}
# azurerm_key_vault_secret.storage_account_connection_string_secret will be updated in-place
~ resource "azurerm_key_vault_secret" "storage_account_connection_string_secret" {
~ expiration_date = "2027-12-19T10:01:22Z" -> (known after apply)
id = "https://fact-kv-prod.vault.azure.net/secrets/storage-account-connection-string/37e75af7af4543edb662288800101f2b"
name = "storage-account-connection-string"
tags = {
"application" = "find-a-court-or-tribunal"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "production"
"managedBy" = "Find a Court or Tribunal"
"source" = "data-api Storage account"
}
# (10 unchanged attributes hidden)
}
# module.storage_account.azurerm_storage_account.storage_account will be updated in-place
~ resource "azurerm_storage_account" "storage_account" {
id = "/subscriptions/8999dec3-0104-4a27-94ee-6588559729d1/resourceGroups/fact-prod/providers/Microsoft.Storage/storageAccounts/factsaprod"
name = "factsaprod"
tags = {
"application" = "find-a-court-or-tribunal"
"builtFrom" = "https://github.com/HMCTS/fact-data-api.git"
"businessArea" = "CFT"
"contactSlackChannel" = "#fact-tech"
"environment" = "production"
"managedBy" = "Find a Court or Tribunal"
}
# (97 unchanged attributes hidden)
+ network_rules {
+ bypass = [
+ "AzureServices",
]
+ default_action = "Allow"
}
# (3 unchanged blocks hidden)
}
Plan: 0 to add, 7 to change, 0 to destroy. |
034c16d to
486642e
Compare
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
0 participants
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.



This PR contains the following updates:
4.54.0→4.57.0Release Notes
hashicorp/terraform-provider-azurerm (azurerm)
v4.57.0Compare Source
NOTE: This release removes the Mobile Network (
azurerm_mobile_network*) resources and data sources due to Azure having retired the serviceFEATURES:
azurerm_automation_runtime_environment(#30991)ENHANCEMENTS:
azurerm_data_protection_backup_vault_customer_managed_key- thekey_vault_key_idproperty now supports keys from a Managed HSM vault (#31365)azurerm_kubernetes_cluster- support for thenode_provisioning_profileblock (#30517)azurerm_log_analytics_cluster_customer_managed_key- thekey_vault_key_idproperty now supports keys from a Managed HSM vault (#31375)azurerm_mssql_database- thetransparent_data_encryption_key_vault_key_idproperty now supports keys from a Managed HSM vault (#31373)BUG FIXES:
azurerm_data_factory- fix ID parsing errors whencustomer_managed_key_identity_idis an empty string (#28621)azurerm_eventhub-partition_countcan now be updated for dedicated clusters (#30993)azurerm_linux_function_app- fix panic when deployed without all required permissions (#31344)v4.56.0Compare Source
ENHANCEMENTS:
healthbot- update to API version2025-05-25(#31328)terraform-plugin-testing- update tov1.14.0(#31334)azurerm_cognitive_account- add support for new attributes (#30778)azurerm_cognitive_account- add support for thekindproperty to rollback or upgrade fromOpenAItoAIServices(#31063)azurerm_databricks_workspace_root_dbfs_customer_managed_key- thekey_vault_key_idproperty now supports keys from Managed HSM Vaults (#31336)azurerm_databricks_workspace_root_dbfs_customer_managed_key- thekey_vault_key_idproperty now supports versionless keys (#31336)azurerm_healthbot- add support for theC1andPESSKUs (#31328)azurerm_lbfixignore_changesbehaviour in updatable properties (#31318)azurerm_network_manager_network_group- add support for themember_typeproperty [GH-30672azurerm_network_manager_static_member- add support for using a subnet as the target resource (#30672)azurerm_virtual_network_gateway- add support for theErGwScaleSKU (#31082)BUG FIXES:
azurerm_container_app_environment_certificate- fix an issue that prevented creating the resource with an empty value forcertificate_password(#31335)azurerm_databricks_workspace_root_dbfs_customer_managed_key- fix a panic that occurred when the customer managed key was removed from the workspace outside of Terraform (#31336)azurerm_databricks_workspace_root_dbfs_customer_managed_key- fix the timeout for the delete operation (#31336)azurerm_storage_blob_inventory_policy- fix setting Resource Identity data (#31313)v4.55.0Compare Source
FEATURES:
azurerm_api_management_workspace(#30241)azurerm_cognitive_account_project(#30916)azurerm_log_analytics_workspace_table_custom_log(#30800)azurerm_mongo_cluster_user(#31205)azurerm_palo_alto_next_generation_firewall_virtual_hub_strata_cloud_manager(#30613)azurerm_palo_alto_next_generation_firewall_virtual_network_strata_cloud_manager(#30613)azurerm_private_dns_zone(#31157)ENHANCEMENTS:
containerregistry- update to API version2025-04-01(#30205)go-azure-helpers- update tov0.75.1(#31148)go-azure-sdk- update tov0.20251202.1181053(#31253)managedidentity- upgrade API version to2024-11-30(#30535)postgres- update to API version2025-08-01(#31162)azurerm_cognitive_account- update validation forcustomer_managed_key.key_vault_key_idto allow managed HSM keys as input (#31147)azurerm_container_app_environment- extend validation forworkload_profile_typefor additional supported SKUs (#30738)azurerm_container_app_environment_certificate- add support for thecertificate_key_vaultblock (#30510)azurerm_data_factory- update validation forcustomer_managed_key_idto allow managed HSM keys as input (#31146)azurerm_mongo_cluster- support for new propertiescustomer_managed_key,data_api_mode_enabled,identity,restore,authentication_methodsandstorage_type(#31100)azurerm_mysql_flexible_server- add support for MySQL version8.4(#31099)azurerm_oracle_autonomous_database- theadmin_passwordproperty is no longerForceNew(#30966)azurerm_postgresql_flexible_server- update validation forcustomer_managed_key.key_vault_key_idandcustomer_managed_key.geo_backup_key_vault_key_idto allow managed HSM keys as input (#31148)azurerm_postgresql_flexible_server- add support for PostgreSQL version18(#31162)azurerm_storage_encryption_scope- update validation forkey_vault_key_idto allow managed HSM keys as input (#31145)BUG FIXES:
azurerm_ssh_public_key- fix normalisation forpublic_keyto avoid removing a literalEOTfrom the base64 encoded content (#31249)azurerm_data_protection_backup_vault- poll delete request for completion (#31202)azurerm_function_app_hybrid_connection- remove validation preventing resource import when using an elastic service plan SKU (#31134)azurerm_key_vault_key-not_before_dateandexpiration_dateare now set into state when empty, fixing an issue where drift was not detected (#31192)azurerm_key_vault_secret-not_before_dateandexpiration_dateare now set into state when empty, fixing an issue where drift was not detected (#31192)azurerm_kubernetes_cluster- fix drift onazure_policy_enabledwhen updating cluster (#30917)azurerm_kubernetes_fleet_update_run- fix a nil pointer dereference to prevent panics (#31213)azurerm_lb_nat_rule- fix an issue that prevented changingfloating_ip_enabledandtcp_reset_enabledfromtruetofalse(#31244)azurerm_lb_outbound_rule- fix an issue that prevented changingtcp_reset_enabledfromtruetofalse(#31244)azurerm_lb_rule- fix an issue that prevented changingfloating_ip_enabledandtcp_reset_enabledfromtruetofalse(#31244)azurerm_private_endpoint- ensure Resource Identity data is set on create to avoidMissing Resource Identity After Createerrors (#31246)azurerm_resource_group- fix poller for theprevent_deletion_if_contains_resourcesfeature, resolving an Azure eventual consistency issue (#31253)azurerm_storage_account- ensure Resource Identity data is set on create to avoidMissing Resource Identity After Createerrors (#31246)azurerm_traffic_manager_profile- fix an issue that prevented changingtraffic_view_enabledfromtruetofalse(#31066)Configuration
📅 Schedule: Branch creation - "after 7am and before 11am every weekday" in timezone Europe/London, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.