Releases: hashicorp/packer-plugin-googlecompute
v1.1.4
What's Changed
Exciting New Features 🎉
- relax GoogleCompute auth file loading to allow OIDC creds by @msarahan in #186
- feat: add
image_source_disk
configuration setting by @ericnorris in #190
Bug fixes🧑🔧 🐞
- Fix acceptance tests with local SSDs by @lbajolet-hashicorp in #198
- post-processor: fix ignored error for artifact by @lbajolet-hashicorp in #199
Other Changes
- Release 1.1.3 by @lbajolet-hashicorp in #194
- Common code reorganisation by @lbajolet-hashicorp in #197
- [COMPLIANCE] Add Copyright and License Headers by @hashicorp-copywrite in #201
New Contributors
- @msarahan made their first contribution in #186
- @ericnorris made their first contribution in #190
Full Changelog: v1.1.3...v1.1.4
v1.1.3
What's Changed
Other Changes
- builder: add fedora-coreos-cloud project by @lbajolet-hashicorp in #192
Full Changelog: v1.1.2...v1.1.3
v1.1.2
What's Changed
Exciting New Features 🎉
- Add architecture support to googlecompute-import post-processor by @anish in #147
- change default machine type to e2-standard-2 by @ledmonster in #171
- feat: adds image_project_id parameter for pushing images to a different GCP project by @opdude in #170
Bug fixes🧑🔧 🐞
- builder: no delete logs OSLogin ssh key if not set by @lbajolet-hashicorp in #162
- builder: leverage AutoDelete for persistent disks by @lbajolet-hashicorp in #167
Doc improvements 📚
- Fix docs extra disks by @lbajolet-hashicorp in #159
- builder: add log for ssh_username with oslogin by @lbajolet-hashicorp in #165
- Migration plugin docs to integration framework by @nywilken in #182
- Update integration docs format by @nywilken in #185
Other Changes
- Release 1.1.1 by @lbajolet-hashicorp in #157
- [COMPLIANCE] Add Copyright and License Headers by @hashicorp-copywrite in #144
- Bump all GitHub Actions and pin; avoid deprecated Node 12 by @tbehling in #166
- cleanup github workflows by @lbajolet-hashicorp in #168
- Sec update workflows for tsccr compliance by @lbajolet-hashicorp in #178
- bump go 1.18 to 1.19 by @lbajolet-hashicorp in #180
- Bump github.com/hashicorp/packer-plugin-sdk from 0.4.0 to 0.5.1 by @dependabot in #181
- [COMPLIANCE] Add Copyright and License Headers by @hashicorp-copywrite in #183
- SEC-090: Automated trusted workflow pinning (2023-07-18) by @hashicorp-tsccr in #175
- makefile: remove old docs targets by @lbajolet-hashicorp in #187
New Contributors
- @anish made their first contribution in #147
- @tbehling made their first contribution in #166
- @ledmonster made their first contribution in #171
- @opdude made their first contribution in #170
- @hashicorp-tsccr made their first contribution in #175
Full Changelog: v1.1.1...v1.1.2
v1.1.1
What's Changed
Exciting New Features 🎉
- Extra block device support by @lbajolet-hashicorp in #153
Doc improvements 📚
- Docs: invert comment lines for ImageSignatureDB and ImageForbiddenSignaturesDB by @zuc in #148
- docs/builder: Fix reference to SSH partial by @nywilken in #154
Other Changes
- Bump github.com/hashicorp/packer-plugin-sdk from 0.3.2 to 0.4.0 by @dependabot in #150
- .gitignore: ignore crash.log by @lbajolet-hashicorp in #155
New Contributors
Full Changelog: v1.1.0...v1.1.1
v1.1.0
Note
In this release the the logic for the wrapper script has been changed so that it sets the metadata status to "error",
when the startup_script_file exits with a non-zero exit code. Since this is treated as an error the builder will fail the build like any other failed provisioner run. Previously when using the wrapped startup script if the executing script failed due to some runtime error the metadata would ignore the non-zero exit code and still mark the status as done. Resulting in a build even though the start script may have failed.
What's Changed
Breaking Changes 🛠
Exciting New Features 🎉
Doc improvements 📚
Other Changes
- [COMPLIANCE] Update MPL 2.0 LICENSE by @hashicorp-copywrite in #124
- Update docs links by @sylviamoss in #128
- Update step_wait_startup_script.go by @whiteley in #122
- Bump github.com/hashicorp/packer-plugin-sdk from 0.3.1 to 0.3.2 by @dependabot in #115
- go.mod: bump go version from 1.17 to 1.18 by @lbajolet-hashicorp in #136
New Contributors
- @hashicorp-copywrite made their first contribution in #124
- @officer made their first contribution in #130
- @whiteley made their first contribution in #122
- @atpons made their first contribution in #123
Full Changelog: v1.0.16...v1.1.0
v1.0.16
What's Changed
Exciting New Features 🎉
Other Changes
- Add GHA for running acceptance test nightly by @nywilken in #112
- Update Plugin binary releases to match Packer by @nywilken in #116
New Contributors
Full Changelog: v1.0.15...v1.0.16
v1.0.15
What's Changed
Exciting New Features 🎉
Other Changes
- Bump github.com/hashicorp/packer-plugin-sdk from 0.3.0 to 0.3.1 by @dependabot in #106
New Contributors
Full Changelog: v1.0.14...v1.0.15
v1.0.14
What's Changed
Exciting New Features 🎉
- Migrate to new Google Cloud impersonation API by @fgateuil in #84
- Added support for node affinity labels by @rosmo in #94
Bug fixes🧑🔧 🐞
Other Changes
- Remove unneeded Sprintf by @jason-h-35 in #96
- goreleaser: add missing target goos/goarch by @lbajolet-hashicorp in #98
- Bump github.com/hashicorp/packer-plugin-sdk from 0.2.13 to 0.3.0 by @dependabot in #97
- Bump github.com/hashicorp/hcl/v2 from 2.12.0 to 2.13.0 by @dependabot in #100
New Contributors
- @jason-h-35 made their first contribution in #96
- @fgateuil made their first contribution in #84
- @lbajolet-hashicorp made their first contribution in #98
- @rosmo made their first contribution in #94
Full Changelog: v1.0.13...v1.0.14
v1.0.13
Note
This release contains the latest golang.org/x/crypto/ssh module which implements client authentication support for signature algorithms based on SHA-2 for use with existing RSA keys. Previously, a client would fail to authenticate with RSA keys to servers that reject signature algorithms based on SHA-1.
What's Changed
Bug fixes🧑🔧 🐞
- Bump packer-plugin-sdk to address legacy SSH key algorithms in SSH communicator
Full Changelog: v1.0.12...v1.0.13
v1.0.12
Note
This release contains the latest golang.org/x/crypto/ssh module which implements client authentication support for signature algorithms based on SHA-2 for use with existing RSA keys. Previously, a client would fail to authenticate with RSA keys to servers that reject signature algorithms based on SHA-1.
What's Changed
Bug fixes🧑🔧 🐞
- Bump packer-plugin-sdk to address legacy SSH key algorithms in SSH communicator
Full Changelog: v1.0.11...v1.0.12