Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package terraform for openSUSE:Factory 
checked in at 2023-01-08 21:25:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/terraform (Old)
 and      /work/SRC/openSUSE:Factory/.terraform.new.1563 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "terraform"

Sun Jan  8 21:25:58 2023 rev:47 rq:1056896 version:1.3.7

Changes:
--------
--- /work/SRC/openSUSE:Factory/terraform/terraform.changes      2022-12-01 
17:22:15.606573482 +0100
+++ /work/SRC/openSUSE:Factory/.terraform.new.1563/terraform.changes    
2023-01-08 21:26:02.779427757 +0100
@@ -1,0 +2,8 @@
+Wed Jan  4 15:53:31 UTC 2023 - Johannes Kastl <ka...@b1-systems.de>
+
+- update to 1.3.7:
+  * BUG FIXES:
+    - Fix exact version constraint parsing for modules using prerelease 
versions ([#32377](https://github.com/hashicorp/terraform/issues/32377))
+    - Prevent panic when a provider returns a null block value during refresh 
which is used as configuration via `ignore_changes` 
([#32428](https://github.com/hashicorp/terraform/issues/32428))
+
+-------------------------------------------------------------------

Old:
----
  terraform-1.3.6.obscpio
  terraform-1.3.6.tar.gz

New:
----
  terraform-1.3.7.obscpio
  terraform-1.3.7.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ terraform.spec ++++++
--- /var/tmp/diff_new_pack.sEv3s8/_old  2023-01-08 21:26:03.879434292 +0100
+++ /var/tmp/diff_new_pack.sEv3s8/_new  2023-01-08 21:26:03.883434316 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package terraform
 #
-# Copyright (c) 2022 SUSE LLC
+# Copyright (c) 2023 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           terraform
-Version:        1.3.6
+Version:        1.3.7
 Release:        0
 Summary:        Tool for building infrastructure safely and efficiently
 License:        MPL-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.sEv3s8/_old  2023-01-08 21:26:03.923434554 +0100
+++ /var/tmp/diff_new_pack.sEv3s8/_new  2023-01-08 21:26:03.927434577 +0100
@@ -3,8 +3,8 @@
     <param name="url">https://github.com/hashicorp/terraform</param>
     <param name="scm">git</param>
     <param name="filename">terraform</param>
-    <param name="versionformat">1.3.6</param>
-    <param name="revision">v1.3.6</param>
+    <param name="versionformat">1.3.7</param>
+    <param name="revision">v1.3.7</param>
     <param name="exclude">.git</param>
   </service>
   <service name="tar" mode="disabled"/>
@@ -16,7 +16,7 @@
     <param name="basename">terraform</param>
   </service>
   <service name="go_modules" mode="disabled">
-    <param name="archive">terraform-1.3.6.tar.gz</param>
+    <param name="archive">terraform-1.3.7.tar.gz</param>
   </service>
 </services>
 

++++++ terraform-1.3.6.obscpio -> terraform-1.3.7.obscpio ++++++
/work/SRC/openSUSE:Factory/terraform/terraform-1.3.6.obscpio 
/work/SRC/openSUSE:Factory/.terraform.new.1563/terraform-1.3.7.obscpio differ: 
char 49, line 1

++++++ terraform-1.3.6.tar.gz -> terraform-1.3.7.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terraform-1.3.6/.go-version 
new/terraform-1.3.7/.go-version
--- old/terraform-1.3.6/.go-version     2022-11-30 21:42:54.000000000 +0100
+++ new/terraform-1.3.7/.go-version     2023-01-04 16:19:39.000000000 +0100
@@ -1 +1 @@
-1.19.3
+1.19.4
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terraform-1.3.6/CHANGELOG.md 
new/terraform-1.3.7/CHANGELOG.md
--- old/terraform-1.3.6/CHANGELOG.md    2022-11-30 21:42:54.000000000 +0100
+++ new/terraform-1.3.7/CHANGELOG.md    2023-01-04 16:19:39.000000000 +0100
@@ -1,3 +1,10 @@
+## 1.3.7 (January 04, 2023)
+
+BUG FIXES:
+
+* Fix exact version constraint parsing for modules using prerelease versions 
([#32377](https://github.com/hashicorp/terraform/issues/32377))
+* Prevent panic when a provider returns a null block value during refresh 
which is used as configuration via `ignore_changes` 
([#32428](https://github.com/hashicorp/terraform/issues/32428))
+
 ## 1.3.6 (November 30, 2022)
 
 BUG FIXES:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terraform-1.3.6/internal/command/unlock.go 
new/terraform-1.3.7/internal/command/unlock.go
--- old/terraform-1.3.6/internal/command/unlock.go      2022-11-30 
21:42:54.000000000 +0100
+++ new/terraform-1.3.7/internal/command/unlock.go      2023-01-04 
16:19:39.000000000 +0100
@@ -88,7 +88,7 @@
 
                desc := "Terraform will remove the lock on the remote state.\n" 
+
                        "This will allow local Terraform commands to modify 
this state, even though it\n" +
-                       "may be still be in use. Only 'yes' will be accepted to 
confirm."
+                       "may still be in use. Only 'yes' will be accepted to 
confirm."
 
                v, err := c.UIInput().Input(context.Background(), 
&terraform.InputOpts{
                        Id:          "force-unlock",
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terraform-1.3.6/internal/initwd/module_install.go 
new/terraform-1.3.7/internal/initwd/module_install.go
--- old/terraform-1.3.6/internal/initwd/module_install.go       2022-11-30 
21:42:54.000000000 +0100
+++ new/terraform-1.3.7/internal/initwd/module_install.go       2023-01-04 
16:19:39.000000000 +0100
@@ -10,7 +10,9 @@
        "path/filepath"
        "strings"
 
+       "github.com/apparentlymart/go-versions/versions"
        version "github.com/hashicorp/go-version"
+
        "github.com/hashicorp/terraform-config-inspect/tfconfig"
        "github.com/hashicorp/terraform/internal/addrs"
        "github.com/hashicorp/terraform/internal/earlyconfig"
@@ -387,9 +389,45 @@
 
                // If we've found a pre-release version then we'll ignore it 
unless
                // it was exactly requested.
-               if v.Prerelease() != "" && req.VersionConstraints.String() != 
v.String() {
-                       log.Printf("[TRACE] ModuleInstaller: %s ignoring %s 
because it is a pre-release and was not requested exactly", key, v)
-                       continue
+               //
+               // The prerelease checking will be handled by a different 
library for
+               // 2 reasons. First, this other library automatically includes 
the
+               // "prerelease versions must be exactly requested" behaviour 
that we are
+               // looking for. Second, this other library is used to handle 
all version
+               // constraints for the provider logic and this is the first 
step to
+               // making the module and provider version logic match.
+               if v.Prerelease() != "" {
+                       // At this point all versions published by the module 
with
+                       // prerelease metadata will be checked. Users may not 
have even
+                       // requested this prerelease so don't print lots of 
unnecessary #
+                       // warnings.
+                       acceptableVersions, err := 
versions.MeetingConstraintsString(req.VersionConstraints.String())
+                       if err != nil {
+                               log.Printf("[WARN] ModuleInstaller: %s ignoring 
%s because the version constraints (%s) could not be parsed: %s", key, v, 
req.VersionConstraints.String(), err.Error())
+                               continue
+                       }
+
+                       // Validate the version is also readable by the other 
versions
+                       // library.
+                       version, err := versions.ParseVersion(v.String())
+                       if err != nil {
+                               log.Printf("[WARN] ModuleInstaller: %s ignoring 
%s because the version (%s) reported by the module could not be parsed: %s", 
key, v, v.String(), err.Error())
+                               continue
+                       }
+
+                       // Finally, check if the prerelease is acceptable to 
version. As
+                       // highlighted previously, we go through all of this 
because the
+                       // apparentlymart/go-versions library handles 
prerelease constraints
+                       // in the apporach we want to.
+                       if !acceptableVersions.Has(version) {
+                               log.Printf("[TRACE] ModuleInstaller: %s 
ignoring %s because it is a pre-release and was not requested exactly", key, v)
+                               continue
+                       }
+
+                       // If we reach here, it means this prerelease version 
was exactly
+                       // requested according to the extra constraints of this 
library.
+                       // We fall through and allow the other library to also 
validate it
+                       // for consistency.
                }
 
                if latestVersion == nil || v.GreaterThan(latestVersion) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/internal/initwd/module_install_test.go 
new/terraform-1.3.7/internal/initwd/module_install_test.go
--- old/terraform-1.3.6/internal/initwd/module_install_test.go  2022-11-30 
21:42:54.000000000 +0100
+++ new/terraform-1.3.7/internal/initwd/module_install_test.go  2023-01-04 
16:19:39.000000000 +0100
@@ -178,6 +178,54 @@
        }
 }
 
+func TestModuleInstaller_ExactMatchPrerelease(t *testing.T) {
+       if os.Getenv("TF_ACC") == "" {
+               t.Skip("this test accesses registry.terraform.io and 
github.com; set TF_ACC=1 to run it")
+       }
+
+       fixtureDir := 
filepath.Clean("testdata/prerelease-version-constraint-match")
+       dir, done := tempChdir(t, fixtureDir)
+       defer done()
+
+       hooks := &testInstallHooks{}
+
+       modulesDir := filepath.Join(dir, ".terraform/modules")
+       inst := NewModuleInstaller(modulesDir, registry.NewClient(nil, nil))
+       cfg, diags := inst.InstallModules(context.Background(), ".", false, 
hooks)
+
+       if diags.HasErrors() {
+               t.Fatalf("found unexpected errors: %s", diags.Err())
+       }
+
+       if 
!cfg.Children["acctest_exact"].Version.Equal(version.Must(version.NewVersion("v0.0.3-alpha.1")))
 {
+               t.Fatalf("expected version %s but found version %s", 
"v0.0.3-alpha.1", cfg.Version.String())
+       }
+}
+
+func TestModuleInstaller_PartialMatchPrerelease(t *testing.T) {
+       if os.Getenv("TF_ACC") == "" {
+               t.Skip("this test accesses registry.terraform.io and 
github.com; set TF_ACC=1 to run it")
+       }
+
+       fixtureDir := filepath.Clean("testdata/prerelease-version-constraint")
+       dir, done := tempChdir(t, fixtureDir)
+       defer done()
+
+       hooks := &testInstallHooks{}
+
+       modulesDir := filepath.Join(dir, ".terraform/modules")
+       inst := NewModuleInstaller(modulesDir, registry.NewClient(nil, nil))
+       cfg, diags := inst.InstallModules(context.Background(), ".", false, 
hooks)
+
+       if diags.HasErrors() {
+               t.Fatalf("found unexpected errors: %s", diags.Err())
+       }
+
+       if 
!cfg.Children["acctest_partial"].Version.Equal(version.Must(version.NewVersion("v0.0.2")))
 {
+               t.Fatalf("expected version %s but found version %s", "v0.0.2", 
cfg.Version.String())
+       }
+}
+
 func TestModuleInstaller_invalid_version_constraint_error(t *testing.T) {
        fixtureDir := filepath.Clean("testdata/invalid-version-constraint")
        dir, done := tempChdir(t, fixtureDir)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/internal/initwd/testdata/prerelease-version-constraint/root.tf
 
new/terraform-1.3.7/internal/initwd/testdata/prerelease-version-constraint/root.tf
--- 
old/terraform-1.3.6/internal/initwd/testdata/prerelease-version-constraint/root.tf
  1970-01-01 01:00:00.000000000 +0100
+++ 
new/terraform-1.3.7/internal/initwd/testdata/prerelease-version-constraint/root.tf
  2023-01-04 16:19:39.000000000 +0100
@@ -0,0 +1,8 @@
+# We expect this test to download the version 0.0.2, the one before the
+# specified version even with the equality because the specified version is a
+# prerelease.
+
+module "acctest_partial" {
+  source = "hashicorp/module-installer-acctest/aws"
+  version = "<=0.0.3-alpha.1"
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/internal/initwd/testdata/prerelease-version-constraint-match/root.tf
 
new/terraform-1.3.7/internal/initwd/testdata/prerelease-version-constraint-match/root.tf
--- 
old/terraform-1.3.6/internal/initwd/testdata/prerelease-version-constraint-match/root.tf
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/terraform-1.3.7/internal/initwd/testdata/prerelease-version-constraint-match/root.tf
    2023-01-04 16:19:39.000000000 +0100
@@ -0,0 +1,7 @@
+# We expect this test to download the requested version because it is an exact
+# match for a prerelease version.
+
+module "acctest_exact" {
+  source = "hashicorp/module-installer-acctest/aws"
+  version = "=0.0.3-alpha.1"
+}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/internal/plans/objchange/plan_valid.go 
new/terraform-1.3.7/internal/plans/objchange/plan_valid.go
--- old/terraform-1.3.6/internal/plans/objchange/plan_valid.go  2022-11-30 
21:42:54.000000000 +0100
+++ new/terraform-1.3.7/internal/plans/objchange/plan_valid.go  2023-01-04 
16:19:39.000000000 +0100
@@ -101,6 +101,14 @@
                                continue
                        }
 
+                       if configV.IsNull() {
+                               // Configuration cannot decode a block into a 
null value, but
+                               // we could be dealing with a null returned by 
a legacy
+                               // provider and inserted via ignore_changes. 
Fix the value in
+                               // place so the length can still be compared.
+                               configV = 
cty.ListValEmpty(configV.Type().ElementType())
+                       }
+
                        plannedL := plannedV.LengthInt()
                        configL := configV.LengthInt()
                        if plannedL != configL {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/internal/plans/objchange/plan_valid_test.go 
new/terraform-1.3.7/internal/plans/objchange/plan_valid_test.go
--- old/terraform-1.3.6/internal/plans/objchange/plan_valid_test.go     
2022-11-30 21:42:54.000000000 +0100
+++ new/terraform-1.3.7/internal/plans/objchange/plan_valid_test.go     
2023-01-04 16:19:39.000000000 +0100
@@ -389,6 +389,41 @@
                        },
                },
 
+               // but don't panic on a null list just in case
+               "nested list, null in config": {
+                       &configschema.Block{
+                               BlockTypes: 
map[string]*configschema.NestedBlock{
+                                       "b": {
+                                               Nesting: 
configschema.NestingList,
+                                               Block: configschema.Block{
+                                                       Attributes: 
map[string]*configschema.Attribute{
+                                                               "c": {
+                                                                       Type:   
  cty.String,
+                                                                       
Optional: true,
+                                                               },
+                                                       },
+                                               },
+                                       },
+                               },
+                       },
+                       cty.ObjectVal(map[string]cty.Value{
+                               "b": 
cty.ListValEmpty(cty.Object(map[string]cty.Type{
+                                       "c": cty.String,
+                               })),
+                       }),
+                       cty.ObjectVal(map[string]cty.Value{
+                               "b": 
cty.NullVal(cty.List(cty.Object(map[string]cty.Type{
+                                       "c": cty.String,
+                               }))),
+                       }),
+                       cty.ObjectVal(map[string]cty.Value{
+                               "b": 
cty.ListValEmpty(cty.Object(map[string]cty.Type{
+                                       "c": cty.String,
+                               })),
+                       }),
+                       nil,
+               },
+
                // blocks can be unknown when using dynamic
                "nested list, unknown nested dynamic": {
                        &configschema.Block{
@@ -1671,7 +1706,7 @@
 
                        t.Logf(
                                "\nprior:  %sconfig:  %splanned: %s",
-                               dump.Value(test.Planned),
+                               dump.Value(test.Prior),
                                dump.Value(test.Config),
                                dump.Value(test.Planned),
                        )
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terraform-1.3.6/internal/terraform/evaluate.go 
new/terraform-1.3.7/internal/terraform/evaluate.go
--- old/terraform-1.3.6/internal/terraform/evaluate.go  2022-11-30 
21:42:54.000000000 +0100
+++ new/terraform-1.3.7/internal/terraform/evaluate.go  2023-01-04 
16:19:39.000000000 +0100
@@ -176,7 +176,7 @@
                        diags = diags.Append(&hcl.Diagnostic{
                                Severity: hcl.DiagError,
                                Summary:  `each.value cannot be used in this 
context`,
-                               Detail:   `A reference to "each.value" has been 
used in a context in which it unavailable, such as when the configuration no 
longer contains the value in its "for_each" expression. Remove this reference 
to each.value in your configuration to work around this error.`,
+                               Detail:   `A reference to "each.value" has been 
used in a context in which it is unavailable, such as when the configuration no 
longer contains the value in its "for_each" expression. Remove this reference 
to each.value in your configuration to work around this error.`,
                                Subject:  rng.ToHCL().Ptr(),
                        })
                        return cty.UnknownVal(cty.DynamicPseudoType), diags
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/testing/equivalence-tests/outputs/local_provider_delete/plan.json
 
new/terraform-1.3.7/testing/equivalence-tests/outputs/local_provider_delete/plan.json
--- 
old/terraform-1.3.6/testing/equivalence-tests/outputs/local_provider_delete/plan.json
       2022-11-30 21:42:54.000000000 +0100
+++ 
new/terraform-1.3.7/testing/equivalence-tests/outputs/local_provider_delete/plan.json
       2023-01-04 16:19:39.000000000 +0100
@@ -15,6 +15,7 @@
   },
   "prior_state": {
     "format_version": "1.0",
+    "terraform_version": "1.3.6",
     "values": {
       "root_module": {
         "resources": [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/testing/equivalence-tests/outputs/local_provider_update/plan.json
 
new/terraform-1.3.7/testing/equivalence-tests/outputs/local_provider_update/plan.json
--- 
old/terraform-1.3.6/testing/equivalence-tests/outputs/local_provider_update/plan.json
       2022-11-30 21:42:54.000000000 +0100
+++ 
new/terraform-1.3.7/testing/equivalence-tests/outputs/local_provider_update/plan.json
       2023-01-04 16:19:39.000000000 +0100
@@ -57,6 +57,7 @@
   },
   "prior_state": {
     "format_version": "1.0",
+    "terraform_version": "1.3.6",
     "values": {
       "root_module": {
         "resources": [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/testing/equivalence-tests/outputs/multiple_block_types_update/plan.json
 
new/terraform-1.3.7/testing/equivalence-tests/outputs/multiple_block_types_update/plan.json
--- 
old/terraform-1.3.6/testing/equivalence-tests/outputs/multiple_block_types_update/plan.json
 2022-11-30 21:42:54.000000000 +0100
+++ 
new/terraform-1.3.7/testing/equivalence-tests/outputs/multiple_block_types_update/plan.json
 2023-01-04 16:19:39.000000000 +0100
@@ -104,6 +104,7 @@
   },
   "prior_state": {
     "format_version": "1.0",
+    "terraform_version": "1.3.6",
     "values": {
       "root_module": {
         "resources": [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_list_update/plan.json
 
new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_list_update/plan.json
--- 
old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_list_update/plan.json
  2022-11-30 21:42:54.000000000 +0100
+++ 
new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_list_update/plan.json
  2023-01-04 16:19:39.000000000 +0100
@@ -82,6 +82,7 @@
   },
   "prior_state": {
     "format_version": "1.0",
+    "terraform_version": "1.3.6",
     "values": {
       "root_module": {
         "resources": [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_map_update/plan.json
 
new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_map_update/plan.json
--- 
old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_map_update/plan.json
   2022-11-30 21:42:54.000000000 +0100
+++ 
new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_map_update/plan.json
   2023-01-04 16:19:39.000000000 +0100
@@ -73,6 +73,7 @@
   },
   "prior_state": {
     "format_version": "1.0",
+    "terraform_version": "1.3.6",
     "values": {
       "root_module": {
         "resources": [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_objects_update/plan.json
 
new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_objects_update/plan.json
--- 
old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_objects_update/plan.json
       2022-11-30 21:42:54.000000000 +0100
+++ 
new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_objects_update/plan.json
       2023-01-04 16:19:39.000000000 +0100
@@ -73,6 +73,7 @@
   },
   "prior_state": {
     "format_version": "1.0",
+    "terraform_version": "1.3.6",
     "values": {
       "root_module": {
         "resources": [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_set_update/plan.json
 
new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_set_update/plan.json
--- 
old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_set_update/plan.json
   2022-11-30 21:42:54.000000000 +0100
+++ 
new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_set_update/plan.json
   2023-01-04 16:19:39.000000000 +0100
@@ -82,6 +82,7 @@
   },
   "prior_state": {
     "format_version": "1.0",
+    "terraform_version": "1.3.6",
     "values": {
       "root_module": {
         "resources": [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/testing/equivalence-tests/outputs/null_provider_delete/plan.json
 
new/terraform-1.3.7/testing/equivalence-tests/outputs/null_provider_delete/plan.json
--- 
old/terraform-1.3.6/testing/equivalence-tests/outputs/null_provider_delete/plan.json
        2022-11-30 21:42:54.000000000 +0100
+++ 
new/terraform-1.3.7/testing/equivalence-tests/outputs/null_provider_delete/plan.json
        2023-01-04 16:19:39.000000000 +0100
@@ -15,6 +15,7 @@
   },
   "prior_state": {
     "format_version": "1.0",
+    "terraform_version": "1.3.6",
     "values": {
       "root_module": {
         "resources": [
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terraform-1.3.6/version/version.go 
new/terraform-1.3.7/version/version.go
--- old/terraform-1.3.6/version/version.go      2022-11-30 21:42:54.000000000 
+0100
+++ new/terraform-1.3.7/version/version.go      2023-01-04 16:19:39.000000000 
+0100
@@ -11,7 +11,7 @@
 )
 
 // The main version number that is being run at the moment.
-var Version = "1.3.6"
+var Version = "1.3.7"
 
 // A pre-release marker for the version. If this is "" (empty string)
 // then it means that it is a final release. Otherwise, this is a pre-release
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/terraform-1.3.6/website/docs/cli/install/apt.mdx 
new/terraform-1.3.7/website/docs/cli/install/apt.mdx
--- old/terraform-1.3.6/website/docs/cli/install/apt.mdx        2022-11-30 
21:42:54.000000000 +0100
+++ new/terraform-1.3.7/website/docs/cli/install/apt.mdx        2023-01-04 
16:19:39.000000000 +0100
@@ -91,6 +91,8 @@
 * Ubuntu 20.10 (`groovy`)
 * Ubuntu 21.04 (`hirsute`)
 * Ubuntu 21.10 (`impish`)
+* Ubuntu 22.04 (`jammy`)
+* Ubuntu 22.10 (`kinetic`)
 
 No repositories are available for other Debian or Ubuntu versions or
 any other APT-based Linux distributions. If you add the repository using
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/terraform-1.3.6/website/docs/language/settings/backends/cos.mdx 
new/terraform-1.3.7/website/docs/language/settings/backends/cos.mdx
--- old/terraform-1.3.6/website/docs/language/settings/backends/cos.mdx 
2022-11-30 21:42:54.000000000 +0100
+++ new/terraform-1.3.7/website/docs/language/settings/backends/cos.mdx 
2023-01-04 16:19:39.000000000 +0100
@@ -59,3 +59,4 @@
 - `key` - (Optional) The path for saving the state file in bucket. Defaults to 
`terraform.tfstate`.
 - `encrypt` - (Optional) Whether to enable server side encryption of the state 
file. If it is true, COS will use 'AES256' encryption algorithm to encrypt 
state file.
 - `acl` - (Optional) Object ACL to be applied to the state file, allows 
`private` and `public-read`. Defaults to `private`.
+- `accelerate` - (Optional) Whether to enable global Acceleration. Defaults to 
`false`.
\ No newline at end of file

++++++ terraform.obsinfo ++++++
--- /var/tmp/diff_new_pack.sEv3s8/_old  2023-01-08 21:26:06.503449881 +0100
+++ /var/tmp/diff_new_pack.sEv3s8/_new  2023-01-08 21:26:06.507449905 +0100
@@ -1,5 +1,5 @@
 name: terraform
-version: 1.3.6
-mtime: 1669840974
-commit: 603f48b2a1e27f102e4f53c0fae53cd591bb03ae
+version: 1.3.7
+mtime: 1672845579
+commit: 43ef4748aaa2773b5465263e5aa4447d6ea5b95e
 

++++++ vendor.tar.gz ++++++
/work/SRC/openSUSE:Factory/terraform/vendor.tar.gz 
/work/SRC/openSUSE:Factory/.terraform.new.1563/vendor.tar.gz differ: char 5, 
line 1

Reply via email to