Skip to content

Commit 5acd902

Browse files
Merge branch 'main' into RADAR-6812-adding-documentation-for-aws-secrets-manager-indexing
2 parents c3e8224 + f556389 commit 5acd902

File tree

87 files changed

+971
-99
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+971
-99
lines changed

.github/workflows/label-content-prs.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,9 @@
55

66
name: 🏷️ Label content PRs
77

8-
on: [pull_request_target]
8+
on:
9+
pull_request_target:
10+
types: [opened, synchronize, reopened]
911

1012
jobs:
1113

content/hcp-docs/data/docs-nav-data.json

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -762,10 +762,6 @@
762762
"title": "Secrets inventory reporting<sup>Beta</sup>",
763763
"path": "vault/secrets-inventory"
764764
},
765-
{
766-
"title": "HCP Vault API",
767-
"href": "/hcp/api-docs/vault"
768-
},
769765
{
770766
"title": "Additional resources",
771767
"routes": [

content/terraform-docs-common/docs/cloud-docs/integrations/service-now/service-catalog-terraform/developer-reference.mdx

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ This function looks for variables following these conventions:
2020

2121
| ServiceNow Variable Name | HCP Terraform Variable |
2222
| -------------------------------- | ---------------------------------------------------------- |
23-
| `tf_var_VARIABLE_NAME` | Terraform Variable: `VARIABLE_NAME` |
23+
| `tf_var_hcl_VARIABLE_NAME` | Terraform Variable: `VARIABLE_NAME` |
2424
| `tf_env_ENV_NAME` | Environment Variable: `ENV_NAME` |
25-
| `sensitive_tf_var_VARIABLE_NAME` | Sensitive Terraform Variable (Write Only): `VARIABLE_NAME` |
25+
| `sensitive_tf_var_hcl_VARIABLE_NAME` | Sensitive Terraform Variable (Write Only): `VARIABLE_NAME` |
2626
| `sensitive_tf_env_ENV_NAME` | Sensitive Environment Variable (Write Only): `ENV_NAME` |
2727

2828
This function takes the ServiceNow Variable Set and HCP Terraform workspace
@@ -61,17 +61,17 @@ Server Development > Script Include.
6161

6262
### Example Service Catalog Flows and Actions
6363

64-
The ServiceNow Service Catalog for Terraform provides sample catalog items that use **Flows**
65-
and **Workflows** as their primary process engines. **Flows** are a newer solution developed
66-
by ServiceNow and are generally preferred over **Workflows**. To see which engine an item is using, open it
67-
in the edit mode and navigate to the **Process Engine** tab. For example, **Create Workspace** uses a **Workflow**,
68-
whereas **Create Workspace Flow** is built upon a **Flow**. You can access both in the **Studio**. You can also
64+
The ServiceNow Service Catalog for Terraform provides sample catalog items that use **Flows**
65+
and **Workflows** as their primary process engines. **Flows** are a newer solution developed
66+
by ServiceNow and are generally preferred over **Workflows**. To see which engine an item is using, open it
67+
in the edit mode and navigate to the **Process Engine** tab. For example, **Create Workspace** uses a **Workflow**,
68+
whereas **Create Workspace Flow** is built upon a **Flow**. You can access both in the **Studio**. You can also
6969
manage **Flows** in the **Flow Designer**. To manage **Workflows**, navigate to **All > Workflow Editor**.
7070

71-
You can find the ServiceNow Example Flows for Terraform in the **ServiceNow Studio > Flows** (or **All > Flow Designer**).
72-
Search for items that belong to the **Terraform** application. By default, Flows execute when someone submits an order request
73-
for a catalog item based on a Flow. Admins can customize the Flows and Actions to add approval flows, set approval rules based
74-
on certain conditions, and configure multiple users or roles as approvers for specific catalog items.
71+
You can find the ServiceNow Example Flows for Terraform in the **ServiceNow Studio > Flows** (or **All > Flow Designer**).
72+
Search for items that belong to the **Terraform** application. By default, Flows execute when someone submits an order request
73+
for a catalog item based on a Flow. Admins can customize the Flows and Actions to add approval flows, set approval rules based
74+
on certain conditions, and configure multiple users or roles as approvers for specific catalog items.
7575

7676
| Flow Name | Description |
7777
| ----------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
@@ -80,19 +80,17 @@ on certain conditions, and configure multiple users or roles as approvers for sp
8080
| Create Run | Creates and queues a new run in the HCP Terraform workspace. |
8181
| Apply Run | Applies a run in the HCP Terraform workspace. |
8282
| Provision Resources | Creates a new HCP Terraform workspace (with auto-apply), creates and queues a run, then applies the run when ready. |
83-
| Provision Resources with Vars | Creates a new HCP Terraform workspace (with auto-apply), creates any variables, creates/queues a run, applies the run when ready.
83+
| Provision Resources with Vars | Creates a new HCP Terraform workspace (with auto-apply), creates any variables, creates/queues a run, applies the run when ready.
8484
| Provision No-Code Workspace and Deploy Resources | Creates a new HCP Terraform workspace based on a no-code module configured in the private registry (with auto-apply), creates any variables, creates and queues a run, then applies the run when ready. |
8585
| Delete Workspace | Creates a destroy run plan. |
8686
| Worker Poll Run State | Polls the HCP Terraform API for the current run state of a workspace. |
8787
| Worker Poll Apply Run | Polls the HCP Terraform API and applies any pending Terraform runs. |
8888
| Worker Poll Destroy Workspace | Queries ServiceNow Terraform Records for resources marked `is_destroyable`, applies the destroy run to destroy resources, and deletes the corresponding Terraform workspace. |
89-
| Update No-Code Workspace and Deploy Resources | Updates an existing no-code workspace to the most recent no-code module version, updates that workspace's attached variable values, and then starts a new Terraform run.
89+
| Update No-Code Workspace and Deploy Resources | Updates an existing no-code workspace to the most recent no-code module version, updates that workspace's attached variable values, and then starts a new Terraform run.
9090
| Update Workspace | Updates HCP Terraform workspace configurations, such as VCS repository, description, project, execution mode, and agent pool ID (if applicable). |
9191
| Update Workspace with Vars | Allows you to change details about the HCP Terraform workspace configurations and attached variable values. |
9292
| Update Resources | Updates HCP Terraform workspace details and starts a new Terraform run with these new values. |
9393
| Update Resources with Vars | Updates your existing HCP Terraform workspace and its variables, then starts a Terraform run with these updated values. |
94-
| Provision Resources with Vars with Approval | Creates a new HCP Terraform workspace, enables auto-apply, creates workspace variables, starts a speculative plan, then pauses for approval. If you approve the run, HCP Terraform applies the plan.
95-
| Update Resources with Vars with Approval | Updates your existing HCP Terraform workspace and its variables, then starts a Terraform run (speculative plan) with these updated values. If request is approved, the plan is applied. If it is rejected then the it will not be applied. |
9694

9795
## ServiceNow ACLs
9896

content/terraform-docs-common/docs/cloud-docs/registry/publish-modules.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ For example, you could use the following release tags in your Git repository:
5858

5959
Then, you could specify `app-` in the **Module Tag Prefix** field when configuring the settings for publishing modules in HCP Terraform or Terraform Enterprise. As a result, the platform selects the module tagged with `app-v1.0.0` and publishes `v1.0.0` to the registry. In this example, HCP Terraform or Terraform Enterprise would also publish version `v1.0.1` of the module when a new release in the repository is tagged with `app-v1.0.1`.
6060

61-
To change the default behavior, you can disable the **Publish modules to your private registry from a single repository** option in your workspace's general settings. When disabled, you should store the source code for each module in separate repositories, otherwise HCP Terraform and Terraform Enterprise may publish new versions of all modules in the repository each time you create a new release tag.
61+
To change the default behavior, you can disable the **Publish modules to your private registry from a single repository** option in your organization settings. When disabled, you should store the source code for each module in separate repositories, otherwise HCP Terraform and Terraform Enterprise may publish new versions of all modules in the repository each time you create a new release tag.
6262

6363
## Publish a new module
6464

content/terraform/v1.12.x/docs/language/import/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ import {
8484
id = "i-abcd1234"
8585
}
8686
87-
resource "aws_instance" "example {
87+
resource "aws_instance" "example" {
8888
count = 2
8989
#. . .
9090
}

content/terraform/v1.12.x/docs/language/modules/configuration.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ In the following example, Terraform selects the module version from a Git reposi
4444
module "vpc" {
4545
source = "git::https://example.com/vpc.git?ref=v1.2.0"
4646
}
47+
```
4748

4849
You can also source a module using its SHA-1 hash:
4950

content/terraform/v1.13.x/docs/language/import/index.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ import {
8989
id = "i-abcd1234"
9090
}
9191
92-
resource "aws_instance" "example {
92+
resource "aws_instance" "example" {
9393
count = 2
9494
#. . .
9595
}

content/terraform/v1.13.x/docs/language/modules/configuration.mdx

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ In the following example, Terraform selects the module version from a Git reposi
4444
module "vpc" {
4545
source = "git::https://example.com/vpc.git?ref=v1.2.0"
4646
}
47+
```
4748

4849
You can also source a module using its SHA-1 hash:
4950

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
### Item-by-item list comparison for allowed_parameters and denied_parameters ((#allowed-parameters-list))
2+
3+
| Change | Affected version | Vault edition
4+
| ------------ | ---------------- | -------------
5+
| Breaking | 1.21.0+ | All
6+
7+
Previous versions of Vault only matched list parameters when the associated
8+
policy defined the list as a whole. As a result, Vault allowed lists containing
9+
denied values as long as the policy did not deny that exact list and denied
10+
lists containing allowed values because the policy did not allow the exact list.
11+
12+
Vault now checks each value in a list parameter against allowed/denied values
13+
in the applicable Vault policy and allows or denies requests if the policy
14+
defines the list as a whole or every/any individual element of the list. For
15+
example, if the request includes a list like `['a', 'b', 'c']`, it still matches
16+
to a policy that includes `['a', 'b', 'c']` but also matches to an approve
17+
policy that includes all the individual values `a`, `b`, and `c` or a deny
18+
policy that includes any of the individual values.
19+
20+
#### Recommendation
21+
22+
Workflows that previously succeeded may now fail due to permission checks
23+
involving `denied_parameters` because the new matching behavior correctly
24+
identifies the fact that the list contains individually denied values even when
25+
the exact list does not appear in the policy.
26+
27+
To address the broken workflow:
28+
- Check whether or not your policies are overly restrictive.
29+
- Update your workflows to avoid including explicitly denied values in lists.
30+
31+
Refer to [list parameter evaluation](/vault/docs/concepts/policies#list-parameter-evaluation) for more information.
32+
33+
You can temporarily revert to the deprecated matching behavior by setting the
34+
`VAULT_LEGACY_EXACT_MATCHING_ON_LIST` environment variable on your Vault server.
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
### Renamed timestamp fields for client count activity export ((#client-count-export))
2+
3+
| Change | Affected version | Vault edition
4+
| ------------ | ---------------- | -------------
5+
| Breaking | 1.21.0+ | All
6+
7+
Vault counts a client the first time that client makes an authenticated API
8+
during the billing period.
9+
10+
Previously, the Activity Export endpoint response included a `timestamp`
11+
field that reflected the creation time and date for the client token, which
12+
could precede the start of the billing period, rather than the time and date
13+
of the first authenticated API call.
14+
15+
To clarify the data returned, the endpoint now returns two timestamp parameters:
16+
17+
- **`client_first_usage_time`** - (new) indicates when the client first made an
18+
authenticated API call during the billing period.
19+
- **`token_creation_time`** - (replaces `timestamp`) indicates the creation
20+
timestamp of the token.
21+
22+
23+
#### Recommendation
24+
25+
Review your use of the `timestamp` field and:
26+
27+
1. Consider if the context makes `client_first_usage_time` a more appropriate
28+
timestamp.
29+
1. Update any remaining references to `timestamp` to use `token_creation_time`.

0 commit comments

Comments
 (0)