Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: coder/terraform-provider-coder
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: v2.8.0
Choose a base ref
...
head repository: coder/terraform-provider-coder
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: main
Choose a head ref
  • 4 commits
  • 10 files changed
  • 3 contributors

Commits on Jun 27, 2025

  1. build(deps): Bump golang.org/x/mod from 0.24.0 to 0.25.0 (#411)

    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored Jun 27, 2025
    Configuration menu
    Copy the full SHA
    e6bbd8c View commit details
    Browse the repository at this point in the history
  2. docs: clarify cron attribute format for coder_script resource (#409)

    Co-authored-by: blink-so[bot] <211532188+blink-so[bot]@users.noreply.github.com>
    blink-so[bot] authored Jun 27, 2025
    Configuration menu
    Copy the full SHA
    0ce611a View commit details
    Browse the repository at this point in the history
  3. Fix coder_script agent_id reference typos (#418)

    Co-authored-by: blink-so[bot] <211532188+blink-so[bot]@users.noreply.github.com>
    Co-authored-by: matifali <[email protected]>
    blink-so[bot] and matifali authored Jun 27, 2025
    Configuration menu
    Copy the full SHA
    6a6f740 View commit details
    Browse the repository at this point in the history

Commits on Jun 30, 2025

  1. Mark tokens as sensitive in data sources (#416)

    * Mark tokens as sensitive in data sources
    
    Mark the following attributes as sensitive to prevent them from being
    logged or displayed in Terraform output:
    
    - data.coder_workspace_owner.me.oidc_access_token
    - data.coder_workspace_owner.me.session_token
    - data.coder_external_auth.example.access_token
    
    This follows the same pattern as ssh_private_key and agent token
    which are already marked as sensitive.
    
    Fixes #266
    
    Co-authored-by: matifali <[email protected]>
    
    * Update documentation for sensitive token attributes
    
    Regenerate documentation to reflect that oidc_access_token, session_token,
    and access_token are now marked as sensitive in the schema.
    
    Co-authored-by: matifali <[email protected]>
    
    ---------
    
    Co-authored-by: blink-so[bot] <211532188+blink-so[bot]@users.noreply.github.com>
    Co-authored-by: matifali <[email protected]>
    blink-so[bot] and matifali authored Jun 30, 2025
    Configuration menu
    Copy the full SHA
    f239e51 View commit details
    Browse the repository at this point in the history
Loading