Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update first-party Pulumi dependencies (master) - autoclosed #1501

Closed
wants to merge 1 commit into from

Conversation

pulumi-renovate[bot]
Copy link

@pulumi-renovate pulumi-renovate bot commented Nov 21, 2024

This PR contains the following updates:

Package Type Update Change
@pulumi/aws (source) dependencies minor 6.59.1 -> 6.60.0
@pulumi/aws (source) dependencies minor 6.47.0 -> 6.60.0
@pulumi/pulumi (source) dependencies minor 3.138.0 -> 3.140.0
github.com/pulumi/providertest require minor v0.0.15 -> v0.1.3
github.com/pulumi/pulumi-aws/sdk/v6 require minor v6.29.0 -> v6.60.0
github.com/pulumi/pulumi-aws/sdk/v6 require minor v6.41.0 -> v6.60.0
github.com/pulumi/pulumi-eks/sdk/v3 require minor v3.0.0-alpha.6 -> v3.2.0
github.com/pulumi/pulumi-kubernetes/sdk/v4 require minor v4.9.1 -> v4.18.3
github.com/pulumi/pulumi/pkg/v3 require minor v3.138.0 -> v3.140.0
github.com/pulumi/pulumi/sdk/v3 require minor v3.112.0 -> v3.140.0
github.com/pulumi/pulumi/sdk/v3 require minor v3.138.0 -> v3.140.0
pulumi/action-install-pulumi-cli action pinDigest -> b374ceb
pulumi/actions action major v5 -> v6
pulumi/provider-version-action action pinDigest -> 7c54f13
pulumi/pulumi-package-publisher action pinDigest -> 1c0359b

Release Notes

pulumi/pulumi-aws (@​pulumi/aws)

v6.60.0

Compare Source

Does the PR have any schema changes?

Looking good! No breaking changes found.

New resources:
  • vpc/securityGroupVpcAssociation.SecurityGroupVpcAssociation
What's Changed

Full Changelog: pulumi/pulumi-aws@v6.59.2...v6.60.0

pulumi/pulumi (@​pulumi/pulumi)

v3.140.0

Compare Source

Features
  • [pkg] Reject schemas with duplicate paths across resources and functions
    #​17797

  • [auto/go] Add --config-file functionality to Go Automation API preview, update, refresh, and destroy
    #​17774

Bug Fixes
  • [cli/plugin] Workaround for escape codes in output from .NET 9
    #​17783

  • [sdk/python] Fix merging InvokeOptions.version
    #​17750

v3.139.0

Compare Source

Features
  • [pkg] Allow generating docs in parallel
    #​17711

  • [programgen] Allow specifying mutually dependant components in PCL

  • [programgen/{dotnet,go,nodejs,python}] Support generating invokes options from PCL for invokes
    #​17696

  • [sdk/nodejs] Allow accessing configuration in Node.js dynamic providers
    #​17697

  • [sdk/nodejs] Implement RunPlugin for the NodeJS language runtime
    #​17724

  • [sdk/nodejs] Support parameterization for TypeScript providers
    #​17738

  • [sdk/python] Add Uv as a Python toolchain
    #​17609

  • [sdk/python] Allow accessing configuration in Python dynamic providers
    #​17673

Bug Fixes
  • [engine] Make plugin downloads/installation cancellable
    #​17621

  • [engine] Fix frequent retries on 403 errors when the update token expires
    #​17714

  • [engine] Don't copy deleted dependencies of untargeted resources
    #​17743

  • [engine] Support renaming providers in targeted operations
    #​17746

  • [engine] Pass correct working directory to RunPlugin
    #​17763

  • [programgen] Allow PCL function element to take a dynamic expression as input in non-strict mode
    #​17587

  • [sdk/nodejs] Fix pnpm pack for [email protected]
    #​17766

  • [sdk/python] Log a message about deleting requirements.txt when converting to using Poetry
    #​17716

  • [sdk/python] Fix an exception in automation api when reading whoami results.
    #​17770

Miscellaneous
  • [sdk/dotnet] Run tests with .NET 9.0
    #​17768
pulumi/providertest (github.com/pulumi/providertest)

v0.1.3

Compare Source

What's Changed

Full Changelog: pulumi/providertest@v0.1.2...v0.1.3

v0.1.2

Compare Source

What's Changed

Full Changelog: pulumi/providertest@v0.1.1...v0.1.2

v0.1.1

Compare Source

What's Changed

Full Changelog: pulumi/providertest@v0.1.0...v0.1.1

v0.1.0

Compare Source

What's Changed

⚠️ Breaking change ⚠️

You must now pass T as the first parameter for any method which does asserts internally, as is the pattern in Go.

You can fix pretty much all usages using the following batch of gofmt commands:

gofmt -r 'a.Convert(b) -> a.Convert(t, b)' -w ./**/*_test.go
gofmt -r 'a.CopyTo(b) -> a.CopyTo(t, b)' -w ./**/*_test.go
gofmt -r 'a.CopyToTempDir() -> a.CopyToTempDir(t)' -w ./**/*_test.go
gofmt -r 'a.Destroy() -> a.Destroy(t)' -w ./**/*_test.go
gofmt -r 'a.ExportStack() -> a.ExportStack(t)' -w ./**/*_test.go
gofmt -r 'a.GrpcLog() -> a.GrpcLog(t)' -w ./**/*_test.go
gofmt -r 'a.ClearGrpcLog() -> a.ClearGrpcLog(t)' -w ./**/*_test.go
gofmt -r 'a.Import(b, c, d, e, f, g) -> a.Import(t, b, c, d, e, f, g)' -w ./**/*_test.go
gofmt -r 'a.Import(b, c, d, e, f) -> a.Import(t, b, c, d, e, f)' -w ./**/*_test.go
gofmt -r 'a.Import(b, c, d, e) -> a.Import(t, b, c, d, e)' -w ./**/*_test.go
gofmt -r 'a.Import(b, c, d) -> a.Import(t, b, c, d)' -w ./**/*_test.go
gofmt -r 'a.Import(b, c) -> a.Import(t, b, c)' -w ./**/*_test.go
gofmt -r 'a.Import(b) -> a.Import(t, b)' -w ./**/*_test.go
gofmt -r 'a.ImportStack(b) -> a.ImportStack(t, b)' -w ./**/*_test.go
gofmt -r 'a.Install() -> a.Install(t)' -w ./**/*_test.go
gofmt -r 'a.InstallStack(b) -> a.InstallStack(t, b)' -w ./**/*_test.go
gofmt -r 'a.Preview() -> a.Preview(t)' -w ./**/*_test.go
gofmt -r 'a.Refresh() -> a.Refresh(t)' -w ./**/*_test.go
gofmt -r 'a.SetConfig(b, c) -> a.SetConfig(t, b, c)' -w ./**/*_test.go
gofmt -r 'a.Up() -> a.Up(t)' -w ./**/*_test.go
gofmt -r 'a.UpdateSource(b) -> a.UpdateSource(t, b)' -w ./**/*_test.go
gofmt -r 'a.NewStack(b) -> a.NewStack(t, b)' -w ./**/*_test.go
gofmt -r 'a.Run(b) -> a.Run(t, b)' -w ./**/*_test.go

New Contributors

Full Changelog: pulumi/providertest@v0.0.15...v0.1.0

pulumi/pulumi-eks (github.com/pulumi/pulumi-eks/sdk/v3)

v3.2.0

Compare Source

Does the PR have any schema changes?

Looking good! No breaking changes found.
No new resources/functions.

What's Changed

Full Changelog: v3.1.0...v3.2.0

v3.1.0

Compare Source

Does the PR have any schema changes?

Looking good! No breaking changes found.
No new resources/functions.

What's Changed

Full Changelog: v3.0.2...v3.1.0

v3.0.2

Compare Source

Does the PR have any schema changes?

Looking good! No breaking changes found.
No new resources/functions.

What's Changed

Full Changelog: v3.0.1...v3.0.2

v3.0.1

Compare Source

Does the PR have any schema changes?

Looking good! No breaking changes found.
No new resources/functions.

What's Changed

Full Changelog: v3.0.0...v3.0.1

v3.0.0

Compare Source

This is the 3.0.0 major release (see #​1425).

This release delivers significant improvements in flexibility, security and introduces new features to enhance your Kubernetes experience on AWS.
AWS recently announced the deprecation of two features used by default in Pulumi EKS: the aws-auth ConfigMap and the AL2 operating system. Pulumi EKS v3 addresses these deprecations, enhances the maintainability of the provider, and aligns it with EKS best practices.

Key Highlights of EKS V3

  1. Support for Amazon Linux 2023 (AL2023) and Bottlerocket Operating Systems: Enhanced operating system options for node groups, allowing you to choose the OS that best fits your workloads and compliance needs. This addresses the upcoming deprecation of Amazon Linux 2 (AL2).

  2. Access Entries for IAM Integration: Enables replacement of the deprecated aws-auth ConfigMap with Access Entries for managing Kubernetes authentication.

  3. EKS Managed Addons: Simplified management of vpc-cni, coredns, and kube-proxy as EKS managed addons.

  4. EKS Security Groups for Pods and Network Policies: Enhanced network security and control within EKS clusters.

New Features and Improvements

Support for Amazon Linux 2023 and Bottlerocket

We have expanded the operating system options for node groups in EKS v3 to address the upcoming deprecation of Amazon Linux 2 (AL2). You can now choose between Amazon Linux 2 (deprecated), Amazon Linux 2023 and Bottlerocket for your EKS nodes. This flexibility allows you to select the OS that best fits your workloads, security requirements, and compliance needs, while ensuring you are using a supported and actively maintained operating system. We've introduced a new operatingSystem property for node groups to facilitate this choice.

Access Entries for IAM Integration

AWS has introduced Access Entries as a new method for granting IAM principals access to Kubernetes resources. This approach relies solely on AWS resources for managing Kubernetes auth, replacing the deprecated aws-auth ConfigMap. You can now leverage Access Entries by setting the authenticationMode to API in your cluster configuration.

EKS Managed Addons

The EKS cluster components vpc-cni, coredns, and kube-proxy are now configured as EKS managed addons. This change simplifies management, especially for clusters with private API endpoints, and ensures that these critical components stay up to date automatically. Additionally it removes the dependency on kubectl, allowing pulumi-native management of clusters.

Cluster Autoscaler Integration

Pulumi EKS v3 introduces better support for the Kubernetes Cluster Autoscaler. A new ignoreScalingChanges parameter for node groups allows Pulumi to ignore external scaling changes, facilitating seamless integration with dynamic scaling solutions.

EKS Security Groups for Pods and Network Policies

We've added support for EKS security groups for pods (example) and EKS Network Policies (example), providing more granular control over pod-to-pod and pod-to-external network communication within your EKS clusters.

Migration Guide

To help you transition smoothly, we've prepared a migration guide with these key steps:

  1. Update node groups to use AL2023 or explicitly configure AL2 if needed.
  2. Replace the deprecated NodeGroup component with NodeGroupV2.
  3. Update your code to handle new output types for certain properties.
  4. Review and update your use of default security groups, which can now be disabled.

Please refer to our EKS v3 Migration Documentation for a detailed guide.

Full Changelog: v2.8.1...v3.0.0

v3.0.0-beta.2

Compare Source

What's Changed

Full Changelog: v3.0.0-beta.1...v3.0.0-beta.2

v3.0.0-beta.1

Compare Source

What's Changed

Full Changelog: v3.0.0-alpha.8...v3.0.0-beta.1

v3.0.0-alpha.8

Compare Source

What's Changed

Full Changelog: v3.0.0-alpha.7...v3.0.0-alpha.8

v3.0.0-alpha.7

Compare Source

pulumi/pulumi-kubernetes (github.com/pulumi/pulumi-kubernetes/sdk/v4)

v4.18.3

Compare Source

Fixed

v4.18.2

Compare Source

Fixed

v4.18.1

Compare Source

Added
Changed

v4.18.0

Compare Source

[!IMPORTANT]
The enableSecretMutable and enableConfigMapMutable options may become the default behavior in a future v5 release of the provider.

Programs that depend on the replacement of Secrets and ConfigMaps (e.g. to trigger updates for downstream dependencies like Deployments) are recommended to explicitly specify immutable: true.

Added
  • The new enableSecretMutable provider configuration option treats changes to Secrets as updates instead of replacements (similar to the enableConfigMapMutable option).

    The default replacement behavior can be preserved for a particular Secret by setting its immutable field to true. (https://github.com/pulumi/pulumi-kubernetes/issues/2291)

  • A warning is now emitted if an object has finalizers which might be blocking deletion. (https://github.com/pulumi/pulumi-kubernetes/issues/1418)

  • EXPERIMENTAL: Generic await logic is now available as an opt-in feature. Running a program with PULUMI_K8S_AWAIT_ALL=true will now cause Pulumi to await readiness for all resources, including custom resources.

    Generic readiness is determined according to some well-known conventions (like the "Ready" condition) as determined by cli-utils.

    Pulumi's current behavior, without this feature enabled, is to assume some resources are immediately available, which can cause downstream resources to fail.

    Existing readiness logic is unaffected by this setting. (https://github.com/pulumi/pulumi-kubernetes/issues/2996)

  • EXPERIMENTAL: The pulumi.com/waitFor annotation was introduced to allow for custom readiness checks. This override Pulumi's own await logic for the resource (however the pulumi.com/skipAwait annotation still takes precedence).

    The value of this annotation can take 3 forms:

    1. A string prefixed with jsonpath= followed by a JSONPath expression and an optional value.

      The JSONPath expression accepts the same syntax as kubectl get -o jsonpath={...}.

      If a value is provided, the resource is considered ready when the JSONPath expression evaluates to the same value. For example this resource expects its "phase" field to have a value of "Running":

      `pulumi.com/waitFor: "jsonpath={.status.phase}=Running"`
      

      If a value is not provided, the resource will be considered ready when any value exists at the given path, similar to kubectl wait --for jsonpath=.... This resource will wait until it has a webhook configured with a CA bundle:

      `pulumi.com/waitFor: "jsonpath={.webhooks[*].clientConfig.caBundle}"`
      
    2. A string prefixed with condition= followed by the type of the condition and an optional status. This matches the behavior of
      kubectl wait --for=condition=... and will wait until the resource has a matching condition. The expected status defaults to "True" if not specified.

      `pulumi.com/waitFor: "condition=Synced"`
      
      `pulumi.com/waitFor: "condition=Reconciling=False"`
      
    3. A string containing a JSON array of multiple jsonpath= and condition= expressions.

      `pulumi.com/waitFor: '["jsonpath={.foo}", "condition=Bar"]'`
      
  • Pulumi will now emit logs for any Kubernetes "Warning" Events associated with resources being created, updated or deleted. (https://github.com/pulumi/pulumi-kubernetes/pull/3135/files)

Fixed

v4.17.1

Compare Source

Fixed

v4.17.0

Compare Source

Changed
Fixed

v4.16.0

Compare Source

Added
  • clusterIdentifier configuration can now be used to manually control the replacement behavior of a provider resource. (https://github.com/pulumi/pulumi-kubernetes/pull/3068)

  • Pod errors now include the pod's last termination state, as well as the pod's termination message if available. (https://github.com/pulumi/pulumi-kubernetes/pull/3091)

    The pod's termination message can be helpful in CrashLoopBackOff situations but will only be reported if it was correctly configured.

    By default, the pod's termination message is read from /dev/termination-log. This location can be configured with terminationMessagePath.

    Use terminationMessagePolicy: FallbackToLogsOnError to use the pod's logs as its termination message.

  • Documentation is now generated for all languages supported by overlay types. (https://github.com/pulumi/pulumi-kubernetes/pull/3107)

Fixed

v4.15.0

Compare Source

Changed
Fixed

v4.14.0

Compare Source

Added
Changed
Fixed

v4.13.1

Compare Source

Added
Changed
Fixed

v4.12.0

Compare Source

Added
Changed
Fixed

v4.11.0

Compare Source

v4.10.0

Compare Source

pulumi/pulumi (github.com/pulumi/pulumi/pkg/v3)

v3.140.0

Compare Source

3.140.0 (2024-11-19)
Features
  • [pkg] Reject schemas with duplicate paths across resources and functions
    #​17797

  • [auto/go] Add --config-file functionality to Go Automation API preview, update, refresh, and destroy
    #​17774

Bug Fixes
  • [cli/plugin] Workaround for escape codes in output from .NET 9
    #​17783

  • [sdk/python] Fix merging InvokeOptions.version
    #​17750

v3.139.0

Compare Source

3.139.0 (2024-11-14)
Features
  • [pkg] Allow generating docs in parallel
    #​17711

  • [programgen] Allow specifying mutually dependant components in PCL

  • [programgen/{dotnet,go,nodejs,python}] Support generating invokes options from PCL for invokes
    #​17696

  • [sdk/nodejs] Allow accessing configuration in Node.js dynamic providers
    #​17697

  • [sdk/nodejs] Implement RunPlugin for the NodeJS language runtime
    #​17724

  • [sdk/nodejs] Support parameterization for TypeScript providers
    #​17738

  • [sdk/python] Add Uv as a Python toolchain
    #​17609

  • [sdk/python] Allow accessing configuration in Python dynamic providers
    #​17673

Bug Fixes
  • [engine] Make plugin downloads/installation cancellable
    #​17621

  • [engine] Fix frequent retries on 403 errors when the update token expires
    #​17714

  • [engine] Don't copy deleted dependencies of untargeted resources
    #​17743

  • [engine] Support renaming providers in targeted operations
    #​17746

  • [engine] Pass correct working directory to RunPlugin
    #​17763

  • [programgen] Allow PCL function element to take a dynamic expression as input in non-strict mode
    #​17587

  • [sdk/nodejs] Fix pnpm pack for [email protected]
    #​17766

  • [sdk/python] Log a message about deleting requirements.txt when converting to using Poetry
    #​17716

  • [sdk/python] Fix an exception in automation api when reading whoami results.
    #​17770

Miscellaneous
  • [sdk/dotnet] Run tests with .NET 9.0
    #​17768
pulumi/actions (pulumi/actions)

v6

Compare Source


Configuration

📅 Schedule: Branch creation - "before 6pm" (UTC), Automerge - "before 4am on Monday" (UTC).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@pulumi-renovate pulumi-renovate bot added dependencies Pull requests that update a dependency file impact/no-changelog-required This issue doesn't require a CHANGELOG update labels Nov 21, 2024
@pulumi-renovate
Copy link
Author

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.21.0 -> 1.23.3
File name: sdk/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 10 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.21 -> 1.23.3
github.com/pulumi/esc v0.8.3 -> v0.10.0
golang.org/x/crypto v0.22.0 -> v0.25.0
golang.org/x/exp v0.0.0-20240409090435-93d18d7e34b8 -> v0.0.0-20240604190554-fc45aab8b7f8
golang.org/x/mod v0.17.0 -> v0.18.0
golang.org/x/net v0.24.0 -> v0.27.0
golang.org/x/sys v0.19.0 -> v0.22.0
golang.org/x/term v0.19.0 -> v0.22.0
golang.org/x/text v0.14.0 -> v0.16.0
golang.org/x/tools v0.20.0 -> v0.22.0
google.golang.org/protobuf v1.33.0 -> v1.34.0

Copy link

Does the PR have any schema changes?

Looking good! No breaking changes found.
No new resources/functions.

@pulumi-renovate pulumi-renovate bot changed the title Update first-party Pulumi dependencies (master) Update first-party Pulumi dependencies (master) - autoclosed Nov 21, 2024
@pulumi-renovate pulumi-renovate bot closed this Nov 21, 2024
@pulumi-renovate pulumi-renovate bot deleted the renovate/master-pulumi branch November 21, 2024 22:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file impact/no-changelog-required This issue doesn't require a CHANGELOG update
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants