Skip to content

fix(deps): update minor/patch updates#238

Open
descope[bot] wants to merge 1 commit intomainfrom
renovate/minorpatch-updates
Open

fix(deps): update minor/patch updates#238
descope[bot] wants to merge 1 commit intomainfrom
renovate/minorpatch-updates

Conversation

@descope
Copy link
Contributor

@descope descope bot commented Nov 19, 2025

This PR contains the following updates:

Package Change Age Confidence Type Update Pending
github.com/descope/terraform-provider-descope/shim v0.2.4v0.3.6 age confidence require minor
github.com/pulumi/pulumi-terraform-bridge/v3 v3.117.0v3.121.0 age confidence require minor v3.122.0
go (source) 1.25.41.26.0 age confidence toolchain minor
go (source) 1.24.81.26.0 age confidence toolchain minor
golang.org/x/text v0.31.0v0.34.0 age confidence require minor
golangci-lint 2.6.22.10.1 age confidence minor
node (source) 20.19.520.20.0 age confidence minor
python 3.11.83.14.3 age confidence minor

Release Notes

descope/terraform-provider-descope (github.com/descope/terraform-provider-descope/shim)

v0.3.6

Compare Source

What's Changed

  • Add exclude_permission_claim, override_subject_claim, and add_jti_claim to JWT templates.
  • Add mandatory user attributes configuration to SSO settings.

Upgrading

See the release notes for v0.3.1 for important notes if you're upgrading from a v0.2.x version.

v0.3.5

Compare Source

What's Changed

  • Add resource descope_management_key for managing management keys in a Descope account.
  • Add resource descope_descoper for managing console users in a Descope account.
  • Add groups_priority attribute to sso settings.
  • Add admin_portal attribute to project settings.
  • Add support for managing custom attributes on access keys.
  • Add new connector types.

Upgrading

See the release notes for v0.3.1 for important notes if you're upgrading from a v0.2.x version.

v0.3.4

Compare Source

What's Changed

  • Add disable_jit_updates attribute to OAuth settings.
  • Add mask_pii attribute to datadog connector.
  • Fix issue with service_label attribute in TOTP settings.

Upgrading

See the release notes for v0.3.1 for important notes if you're upgrading from a v0.2.x version.

v0.3.3

Compare Source

What's Changed

  • Remove requirement to provide a principal project_id and from now on only a management_key is needed to use the Descope provider.
  • Add allow_override_roles attribute to sso settings.
  • Add support for general purpose lists in projects.
  • Always read jwt_templates value when any are set in the project settings.

Upgrading

See the release notes for v0.3.1 for important notes if you're upgrading from a v0.2.x version.

v0.3.2

Compare Source

What's Changed

  • Add allow_duplicate_domains attribute to sso settings.
  • Fix certificate attribute to not be required in saml applications.

Upgrading

See the release notes for v0.3.1 for important notes if you're upgrading from a v0.2.x version.

v0.3.1

Compare Source

What's Changed

  • Add key attribute to roles objects to maintain user role consistency.
  • Role matching will keep the same behavior as before until the key attributes are set.
  • Add temporary_lock and associated attributes to password settings.

Upgrading

If you're managing authorization using the Terraform provider, it's recommended to give each object in the roles list a unique value for the new key attribute (see more details about this attribute below). You can follow these steps:

  1. For each role object in your .tf file, add a new attribute called key and give it a unique value. The specific value doesn't matter, but taking the role name and converting to camel_case is a good option.

  2. Do not make any other changes to your roles. Run terraform apply and ensure that the diff only shows the new key attributes as being added.

  3. Confirm the terraform apply operation to update the .tfstate.

  4. If you run terraform apply without setting the key attributes the provider will show a warning for each role.

    Screenshot 2025-11-20 at 16 32 52

  5. Any changes made to existing roles from now on should always make sure to preserve the key value (see below).

Role Keys

The role objects in the roles list now support a new key attribute. The key is a persistent value that identifies a role uniquely across plan changes and configuration updates. It is used exclusively by the Terraform provider during planning, to ensure that user roles are maintained consistently even when role names or other details are changed. Once the key is set it should never be changed, otherwise the role will be removed and a new one will be created instead.

When upgrading to this release it's recommended to set an explicit key value on each role object, and then to apply the plan without any other changes. The provider will display a warning as long as there roles without a key attribute set.

v0.3.0

Compare Source

What's Changed

  • Add key attribute to roles objects to maintain user role consistency.
  • Add validation to ensure flows have their role requirements satisfied.
  • Added service_label attribute to totp authentication settings.
  • Add support for key generators and native clients in apple OAuth provider.
  • Add invite_expiration and expire_invited_users attributes to invite_settings object.

Upgrading

See the release notes for v0.3.1 for important notes about upgrading.

pulumi/pulumi-terraform-bridge (github.com/pulumi/pulumi-terraform-bridge/v3)

v3.121.0

Compare Source

What's Changed

Full Changelog: pulumi/pulumi-terraform-bridge@v3.120...v3.121.0

v3.120.0

Compare Source

What's Changed

Full Changelog: pulumi/pulumi-terraform-bridge@v3.119.0...v3.120.0

v3.119.0

Compare Source

What's Changed

Full Changelog: pulumi/pulumi-terraform-bridge@v3.118.0...v3.119.0

v3.118.0

Compare Source

What's Changed

Full Changelog: pulumi/pulumi-terraform-bridge@v3.117.0...v3.118.0

golangci/golangci-lint (golangci-lint)

v2.10.1

Compare Source

Released on 2026-02-17

  1. Fixes
    • buildssa panic

v2.10.0

Compare Source

Released on 2026-02-17

  1. Linters new features or changes
    • ginkgolinter: from 0.22.0 to 0.23.0
    • gosec: from 2.22.11 to 2.23.0 (new rules: G117, G602, G701, G702, G703, G704, G705, G706)
    • staticcheck: from 0.6.1 to 0.7.0
  2. Linters bug fixes
    • godoclint: from 0.11.1 to 0.11.2

v2.9.0

Compare Source

Released on 2026-02-10

  1. Enhancements
    • 🎉 go1.26 support
  2. Linters new features or changes
    • arangolint: from 0.3.1 to 0.4.0 (new rule: detect potential query injections)
    • ginkgolinter: from 0.21.2 to 0.22.0 (support for wrappers)
    • golines: from 0.14.0 to 0.15.0
    • misspell: from 0.7.0 to 0.8.0
    • revive: from v1.13.0 to v1.14.0 (new rules: epoch-naming, use-slices-sort)
    • unqueryvet: from 1.4.0 to 1.5.3 (new options: check-n1, check-sql-injection, check-tx-leaks, allow, custom-rules)
    • wsl_v5: from 5.3.0 to 5.6.0 (new rule: after-block)
  3. Linters bug fixes
    • modernize: from 0.41.0 to 0.42.0
    • prealloc: from 1.0.1 to 1.0.2
    • protogetter: from 0.3.18 to 0.3.20
  4. Misc.
    • Log information about files when configuration verification
    • Emit an error when no linters enabled
    • Do not collect VCS information when loading code

v2.8.0

Compare Source

Released on 2026-01-07

  1. Linters new features or changes
    • godoclint: from 0.10.2 to 0.11.1 (new rule: require-stdlib-doclink)
    • golines: from 442fd00 to 0.14.0
    • gomoddirectives: from 0.7.1 to 0.8.0
    • gosec: from daccba6 to 2.22.11 (new rule: G116)
    • modernize: from 0.39.0 to 0.40.0 (new analyzers: stringscut, unsafefuncs)
    • prealloc: from 1.0.0 to 1.0.1 (message changes)
    • unqueryvet: from 1.3.0 to 1.4.0 (new options: check-aliased-wildcard, check-string-concat, check-format-strings, check-string-builder, check-subqueries, ignored-functions, sql-builders)
  2. Linters bug fixes
    • gocritic: from 0.14.2 to 0.14.3
    • errorlint: from 1.8.0 to 1.9.0
    • govet: from 0.39.0 to 0.40.0
    • protogetter: from 0.3.17 to 0.3.18
    • revive: add missing enable-default-rules setting
  3. Documentation
    • docs: split installation page

v2.7.2

Compare Source

Released on 2025-12-07

  1. Linter bug fixes

v2.7.1

Compare Source

Released on 2025-12-04

  1. Linter bug fixes
    • modernize: disable stringscut analyzer

v2.7.0

Compare Source

Released on 2025-12-03

  1. Bug fixes
    • fix: clone args used by custom command
  2. Linters new features or changes
    • nosprintfhostport: from 0.2.0 to 0.3.1 (ignore string literals without a colon)
    • unqueryvet: from 1.2.1 to 1.3.0 (handles const and var declarations)
    • revive: from 1.12.0 to 1.13.0 (new option: enable-default-rules, new rules: forbidden-call-in-wg-go, unnecessary-if, inefficient-map-lookup)
    • modernize: from 0.38.0 to 0.39.0 (new analyzers: plusbuild, stringscut)
  3. Linters bug fixes
    • perfsprint: from 0.10.0 to 0.10.1
    • wrapcheck: from 2.11.0 to 2.12.0
    • godoclint: from 0.10.1 to 0.10.2
  4. Misc.
    • Add some flags to the custom command
  5. Documentation
    • docs: split changelog v1 and v2
nodejs/node (node)

v20.20.0: 2026-01-13, Version 20.20.0 'Iron' (LTS), @​marco-ippolito

Compare Source

This is a security release.

Notable Changes

lib:

Commits

v20.19.6: 2025-11-25, Version 20.19.6 'Iron' (LTS), @​marco-ippolito

Compare Source

Notable Changes
Commits
python/cpython (python)

v3.14.3

Compare Source

v3.14.2

Compare Source

v3.14.1

Compare Source

v3.14.0

Compare Source

v3.13.12

Compare Source

v3.13.11

Compare Source

v3.13.10

Compare Source

v3.13.9

Compare Source

v3.13.8

Compare Source

v3.13.7

Compare Source

v3.13.6

Compare Source

v3.13.5

Compare Source

v3.13.4

Compare Source

v3.13.3

Compare Source

v3.13.2

Compare Source

v3.13.1

Compare Source

v3.13.0

Compare Source

v3.12.12

Compare Source

v3.12.11

Compare Source

v3.12.10

Compare Source

v3.12.9

Compare Source

v3.12.8

Compare Source

v3.12.7

Compare Source

v3.12.6

Compare Source

v3.12.5

Compare Source

v3.12.4

Compare Source

v3.12.3

Compare Source

v3.12.2

Compare Source

v3.12.1

Compare Source

v3.12.0

Compare Source

v3.11.14

Compare Source

v3.11.13

Compare Source

v3.11.12

Compare Source

v3.11.11

Compare Source

v3.11.10

Compare Source

v3.11.9

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@descope descope bot enabled auto-merge (squash) November 19, 2025 11:33
@descope descope bot force-pushed the renovate/minorpatch-updates branch from 41691d9 to f6242af Compare November 20, 2025 16:26
descope-approve[bot]
descope-approve bot previously approved these changes Nov 20, 2025
@descope descope bot force-pushed the renovate/minorpatch-updates branch from f6242af to 6208b2d Compare November 21, 2025 16:34
@descope descope bot changed the title chore(deps): update minor/patch updates fix(deps): update minor/patch updates Nov 21, 2025
descope-approve[bot]
descope-approve bot previously approved these changes Nov 21, 2025
@descope descope bot force-pushed the renovate/minorpatch-updates branch from 464cd5c to a0512a3 Compare November 26, 2025 12:38
@descope descope bot force-pushed the renovate/minorpatch-updates branch from a0512a3 to a0ed71d Compare November 26, 2025 12:42
descope-approve[bot]
descope-approve bot previously approved these changes Nov 26, 2025
descope-approve[bot]
descope-approve bot previously approved these changes Nov 28, 2025
descope-approve[bot]
descope-approve bot previously approved these changes Dec 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants