Skip to content

Commit

Permalink
Merge pull request #990 from hashicorp/prep-release
Browse files Browse the repository at this point in the history
Prep release
  • Loading branch information
uturunku1 authored Aug 7, 2023
2 parents e56f57b + 8a140d1 commit 22bdc14
Show file tree
Hide file tree
Showing 33 changed files with 1,436 additions and 44 deletions.
5 changes: 3 additions & 2 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
## Unreleased

## v0.48.0 (August 7, 2023)

BUG FIXES:
* `r/tfe_workspace`: Fix panic when updating `trigger_patterns` attribute, by @liamstevens [969](https://github.com/hashicorp/terraform-provider-tfe/pull/969)
* `r/tfe_admin_organization_settings`: Allow reprovisioning when the parent organization has been deleted, by @ctrombley [982](https://github.com/hashicorp/terraform-provider-tfe/pull/982)
Expand All @@ -14,8 +16,7 @@ various customizable permissions options to apply to a project and all of the wo
* `d/team_project_access`: Add a `custom` option to the `access` attribute as well as `project_access` and `workspace_access` attributes, by @rberecka [983](https://github.com/hashicorp/terraform-provider-tfe/pull/983)

NOTES:
* The provider is now using go-tfe [v1.30.0](https://github.com/hashicorp/go-tfe/releases/tag/v1.30.0), by @karvounis-form3 [970](https://github.com/hashicorp/terraform-provider-tfe/pull/970)

* The provider is now using go-tfe [v1.32.0](https://github.com/hashicorp/go-tfe/releases/tag/v1.32.0)
## v0.47.0 (July 18, 2023)

FEATURES:
Expand Down
4 changes: 2 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ Declare the provider in your configuration and `terraform init` will automatical
terraform {
required_providers {
tfe = {
version = "~> 0.46.0"
version = "~> 0.48.0"
}
}
}
Expand All @@ -45,7 +45,7 @@ The above snippet using `required_providers` is for Terraform 0.13+; if you are

```hcl
provider "tfe" {
version = "~> 0.46.0"
version = "~> 0.48.0"
...
}
```
Expand Down
5 changes: 4 additions & 1 deletion website/docs/cdktf/csharp/d/policy_set.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ description: |-
Get information on organization policy sets.
---


<!-- Please do not edit this file, it is generated. -->
# Data Source: tfe_policy_set

This data source is used to retrieve a policy set defined in a specified organization.
Expand Down Expand Up @@ -48,6 +50,7 @@ The following arguments are supported:
* `Kind` - The policy-as-code framework for the policy. Valid values are "sentinel" and "opa".
* `Overridable` - Whether users can override this policy when it fails during a run. Only valid for OPA policies.
* `WorkspaceIds` - IDs of the workspaces that use the policy set.
* `ProjectIds` - IDs of the projects that use the policy set.
* `PolicyIds` - IDs of the policies attached to the policy set.
* `PoliciesPath` - The sub-path within the attached VCS repository when using `VcsRepo`.
* `VcsRepo` - Settings for the workspace's VCS repository.
Expand All @@ -63,4 +66,4 @@ The `VcsRepo` block contains:
* `OauthTokenId` - OAuth token ID of the configured VCS connection.


<!-- cache-key: cdktf-0.17.0-pre.15 input-369a7ffb16c0ab83ebbbde324972bb3020c1f6cf5bfbf759dc0563f1d5a4b8b1 -->
<!-- cache-key: cdktf-0.17.0-pre.15 input-54cb92dfae22abe76f4a8306daadcae6353d03b00d72dfbb74c8950c625507e0 -->
67 changes: 67 additions & 0 deletions website/docs/cdktf/csharp/d/saml_settings.html.markdown
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
---
layout: "tfe"
page_title: "Terraform Enterprise: tfe_saml_settings"
description: |-
Get information on SAML Settings.
---


<!-- Please do not edit this file, it is generated. -->
# Data Source: tfe_saml_settings

Use this data source to get information about SAML Settings. It applies only to Terraform Enterprise and requires admin token configuration. See example usage for incorporating an admin token in your provider config.


## Example Usage

Basic usage:

```hcl
provider "tfe" {
hostname = var.hostname
token = var.token
}
provider "tfe" {
alias = "admin"
hostname = var.hostname
token = var.admin_token
}
data "tfe_saml_settings" "foo" {
provider = tfe.admin
}
```

## Argument Reference

No arguments are required for this data source.

## Attributes Reference

The following attributes are exported:

* `Id` - It is always `Saml`.
* `Enabled` - Whether SAML single sign-on is enabled.
* `Debug` - Whether debug mode is enabled, which means that the SAMLResponse XML will be displayed on the login page.
* `TeamManagementEnabled` - Whether Terraform Enterprise is set to manage team membership.
* `AuthnRequestsSigned` - Whether `<samlp:AuthnRequest>` messages are signed.
* `WantAssertionsSigned` - Whether `<saml:Assertion>` elements are signed.
* `IdpCert` - PEM encoded X.509 Certificate as provided by the IdP configuration.
* `OldIdpCert` - Previous version of the PEM encoded X.509 Certificate as provided by the IdP configuration.
* `SloEndpointUrl` - Single Log Out URL.
* `SsoEndpointUrl` - Single Sign On URL.
* `AttrUsername` - Name of the SAML attribute that determines the user's username.
* `AttrGroups` - Name of the SAML attribute that determines team membership.
* `AttrSiteAdmin` - Site admin access role.
* `SiteAdminRole` - Site admin access role.
* `SsoApiTokenSessionTimeout` - Single Sign On session timeout in seconds.
* `AcsConsumerUrl` - ACS Consumer (Recipient) URL.
* `MetadataUrl` - Metadata (Audience) URL.
* `Certificate` - Request and assertion signing certificate.
* `Certificate` - Request and assertion signing certificate.
* `PrivateKey` - The private key used for request and assertion signing.
* `SignatureSigningMethod` - Signature Signing Method.
* `SignatureDigestMethod` - Signature Digest Method.

<!-- cache-key: cdktf-0.17.0-pre.15 input-2995e79c51b29afd8d8b89c5d98dae47701709e1502f993d5be8b2b681de4895 -->
10 changes: 6 additions & 4 deletions website/docs/cdktf/csharp/index.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ description: |-
Provision Terraform Cloud or Terraform Enterprise - with Terraform! Management of organizations, workspaces, teams, variables, run triggers, policy sets, and more. Maintained by the Terraform Cloud team at HashiCorp.
---


<!-- Please do not edit this file, it is generated. -->
# Terraform Cloud/Enterprise Provider

This provider is used to interact with the many resources supported by
Expand Down Expand Up @@ -75,7 +77,7 @@ automatically installed by `terraform init` in the future:
terraform {
required_providers {
tfe = {
version = "~> 0.46.0"
version = "~> 0.48.0"
}
}
}
Expand All @@ -88,7 +90,7 @@ The above snippet using `RequiredProviders` is for Terraform 0.13+; if you are u

```hcl
provider "tfe" {
version = "~> 0.46.0"
version = "~> 0.48.0"
...
}
```
Expand All @@ -101,7 +103,7 @@ For more information on provider installation and constraining provider versions
provider "tfe" {
hostname = var.hostname # Optional, defaults to Terraform Cloud `AppTerraformIo`
token = var.token
version = "~> 0.46.0"
version = "~> 0.48.0"
}
# Create an organization
Expand All @@ -127,4 +129,4 @@ The following arguments are supported:
arguments. Ensure that the organization already exists prior to using this argument.
This can also be specified using the `TfeOrganization` environment variable.

<!-- cache-key: cdktf-0.17.0-pre.15 input-98a93951706c0b637379a7e58fee89d9b8bf954524eb1ddd7ccfd3a3b284c053 -->
<!-- cache-key: cdktf-0.17.0-pre.15 input-a5e1d5b687ea945c66490b8d5558c062336d41c52db56dadeb96156a725efed6 -->
60 changes: 60 additions & 0 deletions website/docs/cdktf/csharp/r/project_policy_set.html.markdown
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
---
layout: "tfe"
page_title: "Terraform Enterprise: tfe_project_policy_set"
description: |-
Add a policy set to a project
---


<!-- Please do not edit this file, it is generated. -->
# tfe_project_policy_set

Adds and removes policy sets from a project

## Example Usage

Basic usage:

```hcl
resource "tfe_organization" "test" {
name = "my-org-name"
email = "[email protected]"
}
resource "tfe_project" "test" {
name = "my-project-name"
organization = tfe_organization.test.name
}
resource "tfe_policy_set" "test" {
name = "my-policy-set"
description = "Some description."
organization = tfe_organization.test.name
}
resource "tfe_project_policy_set" "test" {
policy_set_id = tfe_policy_set.test.id
project_id = tfe_project.test.id
}
```

## Argument Reference

The following arguments are supported:

* `PolicySetId` - (Required) ID of the policy set.
* `ProjectId` - (Required) Project ID to add the policy set to.

## Attributes Reference

* `Id` - The ID of the policy set attachment. ID format: `<project-id>_<policy-set-id>`

## Import

Project Policy Sets can be imported; use `<ORGANIZATION>/<PROJECT ID>/<POLICY SET NAME>`. For example:

```shell
terraform import tfe_project_policy_set.test 'my-org-name/project/policy-set-name'
```

<!-- cache-key: cdktf-0.17.0-pre.15 input-a94d4f5e615194b94eca988f334f60e46c27baa01749b25710f047ee6a038864 -->
67 changes: 67 additions & 0 deletions website/docs/cdktf/csharp/r/saml_settings.html.markdown
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
---
layout: "tfe"
page_title: "Terraform Enterprise: tfe_saml_settings"
description: |-
Manages SAML Settings.
---


<!-- Please do not edit this file, it is generated. -->
# tfe_saml_settings

Use this resource to create, update and destroy SAML Settings. It applies only to Terraform Enterprise and requires admin token configuration. See example usage for incorporating an admin token in your provider config.

## Example Usage

Basic usage for SAML Settings:

```hcl
provider "tfe" {
hostname = var.hostname
token = var.admin_token
}
resource "tfe_saml_settings" "this" {
idp_cert = "foobarCertificate"
slo_endpoint_url = "https://example.com/slo_endpoint_url"
sso_endpoint_url = "https://example.com/sso_endpoint_url"
}
```

## Argument Reference

The following arguments are supported:

* `IdpCert` - (Required) Identity Provider Certificate specifies the PEM encoded X.509 Certificate as provided by the IdP configuration.
* `SloEndpointUrl` - (Required) Single Log Out URL specifies the HTTPS endpoint on your IdP for single logout requests. This value is provided by the IdP configuration.
* `SsoEndpointUrl` - (Required) Single Sign On URL specifies the HTTPS endpoint on your IdP for single sign-on requests. This value is provided by the IdP configuration.
* `Debug` - (Optional) When sign-on fails and this is enabled, the SAMLResponse XML will be displayed on the login page.
* `AuthnRequestsSigned` - (Optional) Whether to ensure that `<samlp:AuthnRequest>` messages are signed.
* `WantAssertionsSigned` - (Optional) Whether to ensure that `<samlp:Assertion>` elements are signed.
* `TeamManagementEnabled` - (Optional) Set it to false if you would rather use Terraform Enterprise to manage team membership.
* `AttrUsername` - (Optional) Username Attribute Name specifies the name of the SAML attribute that determines the user's username.
* `AttrSiteAdmin` - (Optional) Specifies the role for site admin access. Overrides the `Site Admin Role` method.
* `AttrGroups` - (Optional) Team Attribute Name specifies the name of the SAML attribute that determines team membership.
* `SiteAdminRole` - (Optional) Specifies the role for site admin access, provided in the list of roles sent in the Team Attribute Name attribute.
* `SsoApiTokenSessionTimeout` - (Optional) Specifies the Single Sign On session timeout in seconds. Defaults to 14 days.
* `Certificate` - (Optional) The certificate used for request and assertion signing.
* `PrivateKey` - (Optional) The private key used for request and assertion signing.
* `SignatureSigningMethod` - (Optional) Signature Signing Method. Must be either `Sha1` or `Sha256`. Defaults to `Sha256`.
* `SignatureDigestMethod` - (Optional) Signature Digest Method. Must be either `Sha1` or `Sha256`. Defaults to `Sha256`.

## Attributes Reference

* `Id` - The ID of the SAML Settings. Always `Saml`.
* `AcsConsumerUrl` - ACS Consumer (Recipient) URL.
* `MetadataUrl` - Metadata (Audience) URL.
* `OldIdpCert` - Value of the old IDP Certificate.

## Import

SAML Settings can be imported.

```shell
terraform import tfe_saml_settings.this saml
```

<!-- cache-key: cdktf-0.17.0-pre.15 input-638ff2b3454a9c98199c9259ef06e339ead03786f80128a77130cb8fde31700e -->
Loading

0 comments on commit 22bdc14

Please sign in to comment.