-
-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Allow TLS provider to use versions 3.0+ (i.e. - >= 3.0
)
#2211
feat: Allow TLS provider to use versions 3.0+ (i.e. - >= 3.0
)
#2211
Conversation
if we enforce 4.x as the minimum version, then that falls under a breaking change. but if we can change |
3637698
to
4aa954c
Compare
@bryantbiggs thanks for the suggestion. I have updated the commit |
apologies - I made a typo, see the updated comment above |
4aa954c
to
bac1d9d
Compare
bac1d9d
to
f71e74c
Compare
@bryantbiggs no, worries. I was a little confused but decided to trust 😂 |
Do you think we can merge this soon and publish a new version? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
>= 3.0
)
## [18.29.0](v18.28.0...v18.29.0) (2022-08-26) ### Features * Allow TLS provider to use versions 3.0+ (i.e. - `>= 3.0`) ([#2211](#2211)) ([f576a6f](f576a6f))
This PR is included in version 18.29.0 🎉 |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
In #2174 the tls provider was pinned to
~> 3.0
because of hashicorp/terraform-provider-tls#244,of which the corresponding problem was fixed in 4.0.1 of the provider according to the maintainer, which I can confirm.
This PR will upgrade the tls provider to the version which includes the fix.
Motivation and Context
This is required, since we should look forward to being as up to date as possible and to prohibit any provider errors, because
a lot of modules have already upgraded to 4x.
Breaking Changes
None, that I can think of.
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request