Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ ENHANCEMENTS:
* Update `picomatch` package to v2.3.2 and v4.0.4 to address security vulnerabilities ([#4887](https://github.com/microsoft/AzureTRE/issues/4887))

BUG FIXES:
* Enable soft delete on workspace backup Recovery Services vaults and purge protected items on destroy to avoid deployment failures and preserve delete behavior ([#4907](https://github.com/microsoft/AzureTRE/pull/4907))
* Fix OpenAPI/schema sample generation for `get_sample_operation` step parameters. ([#4864](https://github.com/microsoft/AzureTRE/issues/4864))
* Fix test airlock request sample data fields and enum values. ([#4866](https://github.com/microsoft/AzureTRE/issues/4866))
* Fix property substitution not occuring where there is only a main step in the pipeline ([#4824](https://github.com/microsoft/AzureTRE/issues/4824))
Expand Down Expand Up @@ -1703,4 +1704,3 @@ FEATURES:
* Centrally manage the firewall share service state to enable other services to ask for rule changes

Many more enhancements are listed on the [release page](https://github.com/microsoft/AzureTRE/releases/tag/v0.4)

2 changes: 1 addition & 1 deletion core/terraform/appgateway/appgateway.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ resource "azurerm_public_ip" "appgwpip" {
domain_name_label = var.tre_id
tags = local.tre_core_tags

lifecycle { ignore_changes = [tags, zones] }
lifecycle { ignore_changes = [tags, zones, ip_tags] }
}

resource "azurerm_user_assigned_identity" "agw_id" {
Expand Down
2 changes: 1 addition & 1 deletion core/terraform/firewall/firewall.tf
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ resource "azurerm_public_ip" "fwtransit" {
sku = "Standard"
tags = var.tre_core_tags

lifecycle { ignore_changes = [tags, zones] }
lifecycle { ignore_changes = [tags, zones, ip_tags] }
}

moved {
Expand Down
2 changes: 1 addition & 1 deletion core/version.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
__version__ = "0.16.16"
__version__ = "0.16.17"
2 changes: 1 addition & 1 deletion templates/workspaces/base/porter.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
schemaVersion: 1.0.0
name: tre-workspace-base
version: 2.8.3
version: 2.8.4
description: "A base Azure TRE workspace"
dockerfile: Dockerfile.tmpl
registry: azuretre
Expand Down
32 changes: 18 additions & 14 deletions templates/workspaces/base/terraform/.terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 0 additions & 1 deletion templates/workspaces/base/terraform/backup/backup.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@ resource "azurerm_recovery_services_vault" "vault" {
location = var.location
resource_group_name = var.resource_group_name
sku = "Standard"
soft_delete_enabled = false
storage_mode_type = "ZoneRedundant" # Possible values are "GeoRedundant", "LocallyRedundant" and "ZoneRedundant". Defaults to "GeoRedundant".
tags = var.tre_workspace_tags

Expand Down
6 changes: 5 additions & 1 deletion templates/workspaces/base/terraform/providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ terraform {
required_providers {
azurerm = {
source = "hashicorp/azurerm"
version = "= 4.57.0"
version = "= 4.73.0"
}
azuread = {
source = "hashicorp/azuread"
Expand Down Expand Up @@ -33,6 +33,10 @@ provider "azurerm" {
recover_soft_deleted_certificates = true
recover_soft_deleted_keys = true
}
recovery_service {
purge_protected_items_from_vault_on_destroy = true
vm_backup_stop_protection_and_retain_data_on_destroy = false
}
resource_group {
prevent_deletion_if_contains_resources = false
}
Expand Down