Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package terraform for openSUSE:Factory checked in at 2023-01-08 21:25:58 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/terraform (Old) and /work/SRC/openSUSE:Factory/.terraform.new.1563 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "terraform" Sun Jan 8 21:25:58 2023 rev:47 rq:1056896 version:1.3.7 Changes: -------- --- /work/SRC/openSUSE:Factory/terraform/terraform.changes 2022-12-01 17:22:15.606573482 +0100 +++ /work/SRC/openSUSE:Factory/.terraform.new.1563/terraform.changes 2023-01-08 21:26:02.779427757 +0100 @@ -1,0 +2,8 @@ +Wed Jan 4 15:53:31 UTC 2023 - Johannes Kastl <ka...@b1-systems.de> + +- update to 1.3.7: + * BUG FIXES: + - Fix exact version constraint parsing for modules using prerelease versions ([#32377](https://github.com/hashicorp/terraform/issues/32377)) + - Prevent panic when a provider returns a null block value during refresh which is used as configuration via `ignore_changes` ([#32428](https://github.com/hashicorp/terraform/issues/32428)) + +------------------------------------------------------------------- Old: ---- terraform-1.3.6.obscpio terraform-1.3.6.tar.gz New: ---- terraform-1.3.7.obscpio terraform-1.3.7.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ terraform.spec ++++++ --- /var/tmp/diff_new_pack.sEv3s8/_old 2023-01-08 21:26:03.879434292 +0100 +++ /var/tmp/diff_new_pack.sEv3s8/_new 2023-01-08 21:26:03.883434316 +0100 @@ -1,7 +1,7 @@ # # spec file for package terraform # -# Copyright (c) 2022 SUSE LLC +# Copyright (c) 2023 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -17,7 +17,7 @@ Name: terraform -Version: 1.3.6 +Version: 1.3.7 Release: 0 Summary: Tool for building infrastructure safely and efficiently License: MPL-2.0 ++++++ _service ++++++ --- /var/tmp/diff_new_pack.sEv3s8/_old 2023-01-08 21:26:03.923434554 +0100 +++ /var/tmp/diff_new_pack.sEv3s8/_new 2023-01-08 21:26:03.927434577 +0100 @@ -3,8 +3,8 @@ <param name="url">https://github.com/hashicorp/terraform</param> <param name="scm">git</param> <param name="filename">terraform</param> - <param name="versionformat">1.3.6</param> - <param name="revision">v1.3.6</param> + <param name="versionformat">1.3.7</param> + <param name="revision">v1.3.7</param> <param name="exclude">.git</param> </service> <service name="tar" mode="disabled"/> @@ -16,7 +16,7 @@ <param name="basename">terraform</param> </service> <service name="go_modules" mode="disabled"> - <param name="archive">terraform-1.3.6.tar.gz</param> + <param name="archive">terraform-1.3.7.tar.gz</param> </service> </services> ++++++ terraform-1.3.6.obscpio -> terraform-1.3.7.obscpio ++++++ /work/SRC/openSUSE:Factory/terraform/terraform-1.3.6.obscpio /work/SRC/openSUSE:Factory/.terraform.new.1563/terraform-1.3.7.obscpio differ: char 49, line 1 ++++++ terraform-1.3.6.tar.gz -> terraform-1.3.7.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/.go-version new/terraform-1.3.7/.go-version --- old/terraform-1.3.6/.go-version 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/.go-version 2023-01-04 16:19:39.000000000 +0100 @@ -1 +1 @@ -1.19.3 +1.19.4 diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/CHANGELOG.md new/terraform-1.3.7/CHANGELOG.md --- old/terraform-1.3.6/CHANGELOG.md 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/CHANGELOG.md 2023-01-04 16:19:39.000000000 +0100 @@ -1,3 +1,10 @@ +## 1.3.7 (January 04, 2023) + +BUG FIXES: + +* Fix exact version constraint parsing for modules using prerelease versions ([#32377](https://github.com/hashicorp/terraform/issues/32377)) +* Prevent panic when a provider returns a null block value during refresh which is used as configuration via `ignore_changes` ([#32428](https://github.com/hashicorp/terraform/issues/32428)) + ## 1.3.6 (November 30, 2022) BUG FIXES: diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/internal/command/unlock.go new/terraform-1.3.7/internal/command/unlock.go --- old/terraform-1.3.6/internal/command/unlock.go 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/internal/command/unlock.go 2023-01-04 16:19:39.000000000 +0100 @@ -88,7 +88,7 @@ desc := "Terraform will remove the lock on the remote state.\n" + "This will allow local Terraform commands to modify this state, even though it\n" + - "may be still be in use. Only 'yes' will be accepted to confirm." + "may still be in use. Only 'yes' will be accepted to confirm." v, err := c.UIInput().Input(context.Background(), &terraform.InputOpts{ Id: "force-unlock", diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/internal/initwd/module_install.go new/terraform-1.3.7/internal/initwd/module_install.go --- old/terraform-1.3.6/internal/initwd/module_install.go 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/internal/initwd/module_install.go 2023-01-04 16:19:39.000000000 +0100 @@ -10,7 +10,9 @@ "path/filepath" "strings" + "github.com/apparentlymart/go-versions/versions" version "github.com/hashicorp/go-version" + "github.com/hashicorp/terraform-config-inspect/tfconfig" "github.com/hashicorp/terraform/internal/addrs" "github.com/hashicorp/terraform/internal/earlyconfig" @@ -387,9 +389,45 @@ // If we've found a pre-release version then we'll ignore it unless // it was exactly requested. - if v.Prerelease() != "" && req.VersionConstraints.String() != v.String() { - log.Printf("[TRACE] ModuleInstaller: %s ignoring %s because it is a pre-release and was not requested exactly", key, v) - continue + // + // The prerelease checking will be handled by a different library for + // 2 reasons. First, this other library automatically includes the + // "prerelease versions must be exactly requested" behaviour that we are + // looking for. Second, this other library is used to handle all version + // constraints for the provider logic and this is the first step to + // making the module and provider version logic match. + if v.Prerelease() != "" { + // At this point all versions published by the module with + // prerelease metadata will be checked. Users may not have even + // requested this prerelease so don't print lots of unnecessary # + // warnings. + acceptableVersions, err := versions.MeetingConstraintsString(req.VersionConstraints.String()) + if err != nil { + log.Printf("[WARN] ModuleInstaller: %s ignoring %s because the version constraints (%s) could not be parsed: %s", key, v, req.VersionConstraints.String(), err.Error()) + continue + } + + // Validate the version is also readable by the other versions + // library. + version, err := versions.ParseVersion(v.String()) + if err != nil { + log.Printf("[WARN] ModuleInstaller: %s ignoring %s because the version (%s) reported by the module could not be parsed: %s", key, v, v.String(), err.Error()) + continue + } + + // Finally, check if the prerelease is acceptable to version. As + // highlighted previously, we go through all of this because the + // apparentlymart/go-versions library handles prerelease constraints + // in the apporach we want to. + if !acceptableVersions.Has(version) { + log.Printf("[TRACE] ModuleInstaller: %s ignoring %s because it is a pre-release and was not requested exactly", key, v) + continue + } + + // If we reach here, it means this prerelease version was exactly + // requested according to the extra constraints of this library. + // We fall through and allow the other library to also validate it + // for consistency. } if latestVersion == nil || v.GreaterThan(latestVersion) { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/internal/initwd/module_install_test.go new/terraform-1.3.7/internal/initwd/module_install_test.go --- old/terraform-1.3.6/internal/initwd/module_install_test.go 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/internal/initwd/module_install_test.go 2023-01-04 16:19:39.000000000 +0100 @@ -178,6 +178,54 @@ } } +func TestModuleInstaller_ExactMatchPrerelease(t *testing.T) { + if os.Getenv("TF_ACC") == "" { + t.Skip("this test accesses registry.terraform.io and github.com; set TF_ACC=1 to run it") + } + + fixtureDir := filepath.Clean("testdata/prerelease-version-constraint-match") + dir, done := tempChdir(t, fixtureDir) + defer done() + + hooks := &testInstallHooks{} + + modulesDir := filepath.Join(dir, ".terraform/modules") + inst := NewModuleInstaller(modulesDir, registry.NewClient(nil, nil)) + cfg, diags := inst.InstallModules(context.Background(), ".", false, hooks) + + if diags.HasErrors() { + t.Fatalf("found unexpected errors: %s", diags.Err()) + } + + if !cfg.Children["acctest_exact"].Version.Equal(version.Must(version.NewVersion("v0.0.3-alpha.1"))) { + t.Fatalf("expected version %s but found version %s", "v0.0.3-alpha.1", cfg.Version.String()) + } +} + +func TestModuleInstaller_PartialMatchPrerelease(t *testing.T) { + if os.Getenv("TF_ACC") == "" { + t.Skip("this test accesses registry.terraform.io and github.com; set TF_ACC=1 to run it") + } + + fixtureDir := filepath.Clean("testdata/prerelease-version-constraint") + dir, done := tempChdir(t, fixtureDir) + defer done() + + hooks := &testInstallHooks{} + + modulesDir := filepath.Join(dir, ".terraform/modules") + inst := NewModuleInstaller(modulesDir, registry.NewClient(nil, nil)) + cfg, diags := inst.InstallModules(context.Background(), ".", false, hooks) + + if diags.HasErrors() { + t.Fatalf("found unexpected errors: %s", diags.Err()) + } + + if !cfg.Children["acctest_partial"].Version.Equal(version.Must(version.NewVersion("v0.0.2"))) { + t.Fatalf("expected version %s but found version %s", "v0.0.2", cfg.Version.String()) + } +} + func TestModuleInstaller_invalid_version_constraint_error(t *testing.T) { fixtureDir := filepath.Clean("testdata/invalid-version-constraint") dir, done := tempChdir(t, fixtureDir) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/internal/initwd/testdata/prerelease-version-constraint/root.tf new/terraform-1.3.7/internal/initwd/testdata/prerelease-version-constraint/root.tf --- old/terraform-1.3.6/internal/initwd/testdata/prerelease-version-constraint/root.tf 1970-01-01 01:00:00.000000000 +0100 +++ new/terraform-1.3.7/internal/initwd/testdata/prerelease-version-constraint/root.tf 2023-01-04 16:19:39.000000000 +0100 @@ -0,0 +1,8 @@ +# We expect this test to download the version 0.0.2, the one before the +# specified version even with the equality because the specified version is a +# prerelease. + +module "acctest_partial" { + source = "hashicorp/module-installer-acctest/aws" + version = "<=0.0.3-alpha.1" +} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/internal/initwd/testdata/prerelease-version-constraint-match/root.tf new/terraform-1.3.7/internal/initwd/testdata/prerelease-version-constraint-match/root.tf --- old/terraform-1.3.6/internal/initwd/testdata/prerelease-version-constraint-match/root.tf 1970-01-01 01:00:00.000000000 +0100 +++ new/terraform-1.3.7/internal/initwd/testdata/prerelease-version-constraint-match/root.tf 2023-01-04 16:19:39.000000000 +0100 @@ -0,0 +1,7 @@ +# We expect this test to download the requested version because it is an exact +# match for a prerelease version. + +module "acctest_exact" { + source = "hashicorp/module-installer-acctest/aws" + version = "=0.0.3-alpha.1" +} diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/internal/plans/objchange/plan_valid.go new/terraform-1.3.7/internal/plans/objchange/plan_valid.go --- old/terraform-1.3.6/internal/plans/objchange/plan_valid.go 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/internal/plans/objchange/plan_valid.go 2023-01-04 16:19:39.000000000 +0100 @@ -101,6 +101,14 @@ continue } + if configV.IsNull() { + // Configuration cannot decode a block into a null value, but + // we could be dealing with a null returned by a legacy + // provider and inserted via ignore_changes. Fix the value in + // place so the length can still be compared. + configV = cty.ListValEmpty(configV.Type().ElementType()) + } + plannedL := plannedV.LengthInt() configL := configV.LengthInt() if plannedL != configL { diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/internal/plans/objchange/plan_valid_test.go new/terraform-1.3.7/internal/plans/objchange/plan_valid_test.go --- old/terraform-1.3.6/internal/plans/objchange/plan_valid_test.go 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/internal/plans/objchange/plan_valid_test.go 2023-01-04 16:19:39.000000000 +0100 @@ -389,6 +389,41 @@ }, }, + // but don't panic on a null list just in case + "nested list, null in config": { + &configschema.Block{ + BlockTypes: map[string]*configschema.NestedBlock{ + "b": { + Nesting: configschema.NestingList, + Block: configschema.Block{ + Attributes: map[string]*configschema.Attribute{ + "c": { + Type: cty.String, + Optional: true, + }, + }, + }, + }, + }, + }, + cty.ObjectVal(map[string]cty.Value{ + "b": cty.ListValEmpty(cty.Object(map[string]cty.Type{ + "c": cty.String, + })), + }), + cty.ObjectVal(map[string]cty.Value{ + "b": cty.NullVal(cty.List(cty.Object(map[string]cty.Type{ + "c": cty.String, + }))), + }), + cty.ObjectVal(map[string]cty.Value{ + "b": cty.ListValEmpty(cty.Object(map[string]cty.Type{ + "c": cty.String, + })), + }), + nil, + }, + // blocks can be unknown when using dynamic "nested list, unknown nested dynamic": { &configschema.Block{ @@ -1671,7 +1706,7 @@ t.Logf( "\nprior: %sconfig: %splanned: %s", - dump.Value(test.Planned), + dump.Value(test.Prior), dump.Value(test.Config), dump.Value(test.Planned), ) diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/internal/terraform/evaluate.go new/terraform-1.3.7/internal/terraform/evaluate.go --- old/terraform-1.3.6/internal/terraform/evaluate.go 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/internal/terraform/evaluate.go 2023-01-04 16:19:39.000000000 +0100 @@ -176,7 +176,7 @@ diags = diags.Append(&hcl.Diagnostic{ Severity: hcl.DiagError, Summary: `each.value cannot be used in this context`, - Detail: `A reference to "each.value" has been used in a context in which it unavailable, such as when the configuration no longer contains the value in its "for_each" expression. Remove this reference to each.value in your configuration to work around this error.`, + Detail: `A reference to "each.value" has been used in a context in which it is unavailable, such as when the configuration no longer contains the value in its "for_each" expression. Remove this reference to each.value in your configuration to work around this error.`, Subject: rng.ToHCL().Ptr(), }) return cty.UnknownVal(cty.DynamicPseudoType), diags diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/testing/equivalence-tests/outputs/local_provider_delete/plan.json new/terraform-1.3.7/testing/equivalence-tests/outputs/local_provider_delete/plan.json --- old/terraform-1.3.6/testing/equivalence-tests/outputs/local_provider_delete/plan.json 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/testing/equivalence-tests/outputs/local_provider_delete/plan.json 2023-01-04 16:19:39.000000000 +0100 @@ -15,6 +15,7 @@ }, "prior_state": { "format_version": "1.0", + "terraform_version": "1.3.6", "values": { "root_module": { "resources": [ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/testing/equivalence-tests/outputs/local_provider_update/plan.json new/terraform-1.3.7/testing/equivalence-tests/outputs/local_provider_update/plan.json --- old/terraform-1.3.6/testing/equivalence-tests/outputs/local_provider_update/plan.json 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/testing/equivalence-tests/outputs/local_provider_update/plan.json 2023-01-04 16:19:39.000000000 +0100 @@ -57,6 +57,7 @@ }, "prior_state": { "format_version": "1.0", + "terraform_version": "1.3.6", "values": { "root_module": { "resources": [ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/testing/equivalence-tests/outputs/multiple_block_types_update/plan.json new/terraform-1.3.7/testing/equivalence-tests/outputs/multiple_block_types_update/plan.json --- old/terraform-1.3.6/testing/equivalence-tests/outputs/multiple_block_types_update/plan.json 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/testing/equivalence-tests/outputs/multiple_block_types_update/plan.json 2023-01-04 16:19:39.000000000 +0100 @@ -104,6 +104,7 @@ }, "prior_state": { "format_version": "1.0", + "terraform_version": "1.3.6", "values": { "root_module": { "resources": [ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_list_update/plan.json new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_list_update/plan.json --- old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_list_update/plan.json 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_list_update/plan.json 2023-01-04 16:19:39.000000000 +0100 @@ -82,6 +82,7 @@ }, "prior_state": { "format_version": "1.0", + "terraform_version": "1.3.6", "values": { "root_module": { "resources": [ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_map_update/plan.json new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_map_update/plan.json --- old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_map_update/plan.json 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_map_update/plan.json 2023-01-04 16:19:39.000000000 +0100 @@ -73,6 +73,7 @@ }, "prior_state": { "format_version": "1.0", + "terraform_version": "1.3.6", "values": { "root_module": { "resources": [ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_objects_update/plan.json new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_objects_update/plan.json --- old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_objects_update/plan.json 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_objects_update/plan.json 2023-01-04 16:19:39.000000000 +0100 @@ -73,6 +73,7 @@ }, "prior_state": { "format_version": "1.0", + "terraform_version": "1.3.6", "values": { "root_module": { "resources": [ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_set_update/plan.json new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_set_update/plan.json --- old/terraform-1.3.6/testing/equivalence-tests/outputs/nested_set_update/plan.json 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/testing/equivalence-tests/outputs/nested_set_update/plan.json 2023-01-04 16:19:39.000000000 +0100 @@ -82,6 +82,7 @@ }, "prior_state": { "format_version": "1.0", + "terraform_version": "1.3.6", "values": { "root_module": { "resources": [ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/testing/equivalence-tests/outputs/null_provider_delete/plan.json new/terraform-1.3.7/testing/equivalence-tests/outputs/null_provider_delete/plan.json --- old/terraform-1.3.6/testing/equivalence-tests/outputs/null_provider_delete/plan.json 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/testing/equivalence-tests/outputs/null_provider_delete/plan.json 2023-01-04 16:19:39.000000000 +0100 @@ -15,6 +15,7 @@ }, "prior_state": { "format_version": "1.0", + "terraform_version": "1.3.6", "values": { "root_module": { "resources": [ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/version/version.go new/terraform-1.3.7/version/version.go --- old/terraform-1.3.6/version/version.go 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/version/version.go 2023-01-04 16:19:39.000000000 +0100 @@ -11,7 +11,7 @@ ) // The main version number that is being run at the moment. -var Version = "1.3.6" +var Version = "1.3.7" // A pre-release marker for the version. If this is "" (empty string) // then it means that it is a final release. Otherwise, this is a pre-release diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/website/docs/cli/install/apt.mdx new/terraform-1.3.7/website/docs/cli/install/apt.mdx --- old/terraform-1.3.6/website/docs/cli/install/apt.mdx 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/website/docs/cli/install/apt.mdx 2023-01-04 16:19:39.000000000 +0100 @@ -91,6 +91,8 @@ * Ubuntu 20.10 (`groovy`) * Ubuntu 21.04 (`hirsute`) * Ubuntu 21.10 (`impish`) +* Ubuntu 22.04 (`jammy`) +* Ubuntu 22.10 (`kinetic`) No repositories are available for other Debian or Ubuntu versions or any other APT-based Linux distributions. If you add the repository using diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/terraform-1.3.6/website/docs/language/settings/backends/cos.mdx new/terraform-1.3.7/website/docs/language/settings/backends/cos.mdx --- old/terraform-1.3.6/website/docs/language/settings/backends/cos.mdx 2022-11-30 21:42:54.000000000 +0100 +++ new/terraform-1.3.7/website/docs/language/settings/backends/cos.mdx 2023-01-04 16:19:39.000000000 +0100 @@ -59,3 +59,4 @@ - `key` - (Optional) The path for saving the state file in bucket. Defaults to `terraform.tfstate`. - `encrypt` - (Optional) Whether to enable server side encryption of the state file. If it is true, COS will use 'AES256' encryption algorithm to encrypt state file. - `acl` - (Optional) Object ACL to be applied to the state file, allows `private` and `public-read`. Defaults to `private`. +- `accelerate` - (Optional) Whether to enable global Acceleration. Defaults to `false`. \ No newline at end of file ++++++ terraform.obsinfo ++++++ --- /var/tmp/diff_new_pack.sEv3s8/_old 2023-01-08 21:26:06.503449881 +0100 +++ /var/tmp/diff_new_pack.sEv3s8/_new 2023-01-08 21:26:06.507449905 +0100 @@ -1,5 +1,5 @@ name: terraform -version: 1.3.6 -mtime: 1669840974 -commit: 603f48b2a1e27f102e4f53c0fae53cd591bb03ae +version: 1.3.7 +mtime: 1672845579 +commit: 43ef4748aaa2773b5465263e5aa4447d6ea5b95e ++++++ vendor.tar.gz ++++++ /work/SRC/openSUSE:Factory/terraform/vendor.tar.gz /work/SRC/openSUSE:Factory/.terraform.new.1563/vendor.tar.gz differ: char 5, line 1