Skip to content

Commit 7cf9d40

Browse files
authored
Releasing version 7.23.0
Releasing version 7.23.0
2 parents 3a6d6db + 7fa5208 commit 7cf9d40

File tree

1,237 files changed

+11267
-3911
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,237 files changed

+11267
-3911
lines changed

CHANGELOG.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,21 @@
1+
## 7.23.0 (October 22, 2025)
2+
3+
### Added
4+
- Support for OCI FSS support for additional LDAP schema RFC2307bis.
5+
- Support for Fleet Software Update to support 26ai version
6+
- Support for FAaaS IPv6 Support
7+
- Support for [SIGINT] Passing context to GO SDK
8+
- Unit shape exposure in SDK and Terraform for genai
9+
- Support for Standalone Plane - Subscription Ack not being updateable
10+
- Support for JMS Fleet Agent Configuration resource
11+
- Support for JMS common variables
12+
- Fix devops deploy helm stage set_values and set_string bug
13+
- API Doc link and example link to resource doc
14+
15+
### Bug Fix
16+
- for resourcemanager in provider version 7.22
17+
- Increase time out limit for Vm Cluster resource
18+
119
## 7.22.0 (October 7, 2025)
220

321
### Added

examples/README.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ This directory contains Terraform configuration files showing how to create spec
1111
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/aiLanguage.zip)
1212
- aiVision
1313
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/aiVision.zip)
14+
- ai_data_platform
15+
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/ai_data_platform.zip)
1416
- always_free
1517
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/always_free.zip)
1618
- analytics
@@ -137,6 +139,8 @@ This directory contains Terraform configuration files showing how to create spec
137139
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/identity_domains.zip)
138140
- integration
139141
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/integration.zip)
142+
- iot
143+
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/iot.zip)
140144
- jms
141145
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/jms.zip)
142146
- jms_java_downloads
@@ -171,6 +175,8 @@ This directory contains Terraform configuration files showing how to create spec
171175
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/metering_computation.zip)
172176
- monitoring
173177
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/monitoring.zip)
178+
- multicloud
179+
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/multicloud.zip)
174180
- mysql
175181
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/mysql.zip)
176182
- network_firewall
@@ -229,6 +235,8 @@ This directory contains Terraform configuration files showing how to create spec
229235
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/recovery.zip)
230236
- redis
231237
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/redis.zip)
238+
- resource_analytics
239+
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/resource_analytics.zip)
232240
- resourcemanager
233241
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/resourcemanager.zip)
234242
- resourcescheduler
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
# Overview
2+
This is a Terraform configuration that creates the `ai_data_platform` service on Oracle Cloud Infrastructure.
3+
4+
The Terraform code is used to create a Resource Manager stack, that creates the required resources and configures the application on the created resources.
5+
## Magic Button
6+
[![Deploy to Oracle Cloud](https://oci-resourcemanager-plugin.plugins.oci.oraclecloud.com/latest/deploy-to-oracle-cloud.svg)](https://cloud.oracle.com/resourcemanager/stacks/create?zipUrl=https://github.com/oracle/terraform-provider-oci/raw/master/examples/zips/ai_data_platform.zip)
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
# Overview
2+
This is a Terraform configuration that creates the `ai_data_platform` service on Oracle Cloud Infrastructure.
3+
4+
The Terraform code is used to create a Resource Manager stack, that creates the required resources and configures the application on the created resources.

examples/cloudguard/adhoc_query/adhoc_query.tf

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,6 @@
22
// Licensed under the Mozilla Public License v2.0
33

44
variable "tenancy_ocid" {}
5-
variable "user_ocid" {}
6-
variable "fingerprint" {}
7-
variable "private_key_path" {}
85
variable "region" {}
96
variable "compartment_id" {}
107

@@ -58,12 +55,7 @@ provider "oci" {
5855
auth = "SecurityToken"
5956
config_file_profile = "terraform-federation-test"
6057
region = var.region
61-
//version = "5.39.0"
62-
/*tenancy_ocid = var.tenancy_ocid
63-
user_ocid = var.user_ocid
64-
fingerprint = var.fingerprint
65-
private_key_path = var.private_key_path
66-
region = var.region*/
58+
# version = "7.19.0"
6759
}
6860

6961
resource "oci_cloud_guard_adhoc_query" "test_adhoc_query" {

examples/cloudguard/configuration/cloud_guard_configuration.tf

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,6 @@
22
// Licensed under the Mozilla Public License v2.0
33

44
variable "tenancy_ocid" {}
5-
variable "user_ocid" {}
6-
variable "fingerprint" {}
7-
variable "private_key_path" {}
85
variable "region" {}
96
variable "compartment_id" {}
107

@@ -30,26 +27,25 @@ variable "cloud_guard_configuration_self_manage_resources" {
3027
}
3128

3229
provider "oci" {
33-
tenancy_ocid = "${var.tenancy_ocid}"
34-
user_ocid = "${var.user_ocid}"
35-
fingerprint = "${var.fingerprint}"
36-
private_key_path = "${var.private_key_path}"
37-
region = "${var.region}"
30+
auth = "SecurityToken"
31+
config_file_profile = "terraform-federation-test"
32+
region = var.region
33+
# version = "7.19.0"
3834
}
3935

4036
//CloudGuard enabling and disabling is a tenant-level operation so the compartment-id needs to be a tenant-ocid.
4137
resource "oci_cloud_guard_cloud_guard_configuration" "test_cloud_guard_configuration" {
4238
#Required
43-
compartment_id = "${var.tenancy_ocid}"
44-
reporting_region = "${var.cloud_guard_configuration_reporting_region}"
45-
status = "${var.cloud_guard_configuration_status}"
39+
compartment_id = var.tenancy_ocid
40+
reporting_region = var.cloud_guard_configuration_reporting_region
41+
status = var.cloud_guard_configuration_status
4642

4743
#Optional
48-
self_manage_resources = "${var.cloud_guard_configuration_self_manage_resources}"
44+
self_manage_resources = var.cloud_guard_configuration_self_manage_resources
4945
}
5046

5147
//You can inspect the details of a tenant (whether CloudGuard is enabled/disabled) through any of its child compartments.
5248
data "oci_cloud_guard_cloud_guard_configuration" "test_cloud_guard_configuration" {
5349
#Required
54-
compartment_id = "${var.compartment_id}"
50+
compartment_id = var.compartment_id
5551
}

examples/cloudguard/data_mask_rule/cloud_guard_data_mask_rule.tf

Lines changed: 21 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,6 @@
22
// Licensed under the Mozilla Public License v2.0
33

44
variable "tenancy_ocid" {}
5-
variable "user_ocid" {}
6-
variable "fingerprint" {}
7-
variable "private_key_path" {}
85
variable "region" {}
96
variable "compartment_id" {}
107

@@ -63,44 +60,43 @@ variable "data_mask_rule_iam_group_id" {
6360

6461

6562
provider "oci" {
66-
tenancy_ocid = "${var.tenancy_ocid}"
67-
user_ocid = "${var.user_ocid}"
68-
fingerprint = "${var.fingerprint}"
69-
private_key_path = "${var.private_key_path}"
70-
region = "${var.region}"
63+
auth = "SecurityToken"
64+
config_file_profile = "terraform-federation-test"
65+
region = var.region
66+
# version = "7.19.0"
7167
}
7268

7369
resource "oci_cloud_guard_data_mask_rule" "test_data_mask_rule" {
7470
#Required
75-
compartment_id = "${var.tenancy_ocid}"
76-
data_mask_categories = "${var.data_mask_rule_data_mask_categories}"
77-
display_name = "${var.data_mask_rule_display_name}"
78-
iam_group_id = "${var.data_mask_rule_iam_group_id}"
71+
compartment_id = var.tenancy_ocid
72+
data_mask_categories = var.data_mask_rule_data_mask_categories
73+
display_name = var.data_mask_rule_display_name
74+
iam_group_id = var.data_mask_rule_iam_group_id
7975
target_selected {
8076
#Required
81-
kind = "${var.data_mask_rule_target_selected_kind}"
77+
kind = var.data_mask_rule_target_selected_kind
8278

8379
#Optional
84-
values = "${var.data_mask_rule_target_selected_values}"
80+
values = var.data_mask_rule_target_selected_values
8581
}
8682

8783
#Optional
88-
data_mask_rule_status = "${var.data_mask_rule_data_mask_rule_status}"
89-
description = "${var.data_mask_rule_description}"
90-
state = "${var.data_mask_rule_state}"
84+
data_mask_rule_status = var.data_mask_rule_data_mask_rule_status
85+
description = var.data_mask_rule_description
86+
state = var.data_mask_rule_state
9187
}
9288

9389
data "oci_cloud_guard_data_mask_rules" "test_data_mask_rules" {
9490
#Required
95-
compartment_id = "${var.tenancy_ocid}"
91+
compartment_id = var.tenancy_ocid
9692

9793
#Optional
98-
access_level = "${var.data_mask_rule_access_level}"
99-
data_mask_rule_status = "${var.data_mask_rule_data_mask_rule_status}"
100-
display_name = "${var.data_mask_rule_display_name}"
101-
iam_group_id = "${var.data_mask_rule_iam_group_id}"
102-
state = "${var.data_mask_rule_state}"
103-
target_id = "${var.data_mask_rule_target_id}"
104-
target_type = "${var.data_mask_rule_target_type}"
94+
access_level = var.data_mask_rule_access_level
95+
data_mask_rule_status = var.data_mask_rule_data_mask_rule_status
96+
display_name = var.data_mask_rule_display_name
97+
iam_group_id = var.data_mask_rule_iam_group_id
98+
state = var.data_mask_rule_state
99+
target_id = var.data_mask_rule_target_id
100+
target_type = var.data_mask_rule_target_type
105101
}
106102

examples/cloudguard/data_source/cloud_guard_data_source.tf

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,6 @@
22
// Licensed under the Mozilla Public License v2.0
33

44
variable "tenancy_ocid" {}
5-
variable "user_ocid" {}
6-
variable "fingerprint" {}
7-
variable "private_key_path" {}
85
variable "region" {}
96
variable "compartment_id" {}
107

@@ -79,20 +76,14 @@ variable "data_source_data_source_details_query_start_time_start_policy_type" {
7976
}
8077

8178
variable "data_source_data_source_details_query_start_time_query_start_time" {
82-
default = "2024-05-02T12:52:59.817Z"
79+
default = "2025-09-26T04:00:00Z"
8380
}
8481

8582
provider "oci" {
8683
auth = "SecurityToken"
8784
config_file_profile = "terraform-federation-test"
8885
region = var.region
89-
//version = "5.39.0"
90-
/*
91-
tenancy_ocid = var.tenancy_ocid
92-
user_ocid = var.user_ocid
93-
fingerprint = var.fingerprint
94-
private_key_path = var.private_key_path
95-
*/
86+
# version = "7.19.0"
9687
}
9788

9889
data "oci_cloud_guard_data_sources" "test_data_sources" {
@@ -136,4 +127,11 @@ resource "oci_cloud_guard_data_source" "test_data_source" {
136127
defined_tags = { "example-tag-namespace-all.example-tag" = var.data_source_defined_tags_value }
137128
freeform_tags = var.data_source_freeform_tags
138129
status = var.data_source_status
130+
131+
# To ignore diff during backward compat test
132+
lifecycle {
133+
ignore_changes = [
134+
defined_tags
135+
]
136+
}
139137
}

examples/cloudguard/detector_recipe/cloud_guard_detector_recipe.tf

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -80,23 +80,23 @@ provider "oci" {
8080
auth = "SecurityToken"
8181
config_file_profile = "terraform-federation-test"
8282
region = var.region
83-
# version = "6.34.0"
83+
# version = "7.19.0"
8484
}
8585

8686
data "oci_cloud_guard_detector_recipes" "test_detector_recipes" {
8787
#Required
88-
compartment_id = "${var.tenancy_ocid}"
88+
compartment_id = var.tenancy_ocid
8989

9090
#Optional
91-
state = "${var.detector_recipe_state}"
91+
state = var.detector_recipe_state
9292
# Adding this to make sure the detector_rule_id we use later on is valid against the returned recipes
9393
display_name = "OCI Configuration Detector Recipe"
9494
}
9595

9696
resource "oci_cloud_guard_detector_recipe" "test_detector_recipe" {
9797
#Required
98-
compartment_id = "${var.compartment_ocid}"
99-
display_name = "${var.detector_recipe_display_name}"
98+
compartment_id = var.compartment_ocid
99+
display_name = var.detector_recipe_display_name
100100
/*
101101
When CloudGuard is Enabled, an Oracle Managed Detector Recipe is made available having all the default rules in their default state.
102102
If an user needs to make its own recipe with customizations to the rules, it needs to clone an `ORACLE MANAGED DETECTOR RECIPE`.
@@ -109,32 +109,32 @@ resource "oci_cloud_guard_detector_recipe" "test_detector_recipe" {
109109
If user chooses to create its own ORACLE Managed Entity, below value should have id of the ORACLE
110110
MANAGED Entity which is always available
111111
*/
112-
source_detector_recipe_id = "${data.oci_cloud_guard_detector_recipes.test_detector_recipes.detector_recipe_collection.0.items.0.id}"
112+
source_detector_recipe_id = data.oci_cloud_guard_detector_recipes.test_detector_recipes.detector_recipe_collection.0.items.0.id
113113

114114
#Optional
115-
description = "${var.detector_recipe_description}"
115+
description = var.detector_recipe_description
116116

117117
detector_rules {
118118
#Required
119119
details {
120120
#Required
121-
is_enabled = "${var.detector_recipe_detector_rules_details_is_enabled}"
122-
risk_level = "${var.detector_recipe_detector_rules_details_risk_level}"
121+
is_enabled = var.detector_recipe_detector_rules_details_is_enabled
122+
risk_level = var.detector_recipe_detector_rules_details_risk_level
123123

124124
#Optional
125-
condition = "${var.detector_recipe_detector_rules_details_condition}"
125+
condition = var.detector_recipe_detector_rules_details_condition
126126

127127
configurations {
128128
#Required
129-
config_key = "${var.detector_recipe_detector_rules_details_configurations_config_key}"
130-
name = "${var.detector_recipe_detector_rules_details_configurations_name}"
129+
config_key = var.detector_recipe_detector_rules_details_configurations_config_key
130+
name = var.detector_recipe_detector_rules_details_configurations_name
131131

132132
#Optional
133-
data_type = "${var.detector_recipe_detector_rules_details_configurations_data_type}"
134-
value = "${var.detector_recipe_detector_rules_details_configurations_value}"
133+
data_type = var.detector_recipe_detector_rules_details_configurations_data_type
134+
value = var.detector_recipe_detector_rules_details_configurations_value
135135
}
136136

137-
labels = "${var.detector_recipe_detector_rules_details_labels}"
137+
labels = var.detector_recipe_detector_rules_details_labels
138138
}
139139
// Make sure the detector rule id is valid for the detector recipe being cloned.
140140
detector_rule_id = "LB_CERTIFICATE_EXPIRING_SOON"

examples/cloudguard/managed_list/cloud_guard_managed_list.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ provider "oci" {
5757
auth = "SecurityToken"
5858
config_file_profile = "terraform-federation-test"
5959
region = var.region
60-
# version = "6.34.0"
60+
# version = "7.19.0"
6161
}
6262

6363
resource "oci_cloud_guard_managed_list" "test_managed_list" {

0 commit comments

Comments
 (0)