Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update terraform vault to ~> 3.25.0 #6

Closed
wants to merge 1 commit into from

Conversation

dezeroku
Copy link
Owner

@dezeroku dezeroku commented Sep 3, 2023

This PR contains the following updates:

Package Type Update Change
vault (source) required_provider minor ~> 3.19.0 -> ~> 3.25.0

⚠ Dependency Lookup Warnings ⚠

Warnings were logged while processing this repo. Please check the logs for more information.


Release Notes

hashicorp/terraform-provider-vault (vault)

v3.25.0

Compare Source

FEATURES:

  • Add destination and association resources to support Secrets Sync. Requires Vault 1.16+ (#​2098).
  • Add support for configuration of plugin WIF to the AWS Secret Backend. Requires Vault 1.16+ (#​2138).
  • Add support for Oracle database plugin configuration options split_statements and disconnect_sessions: (#​2085)

IMPROVEMENTS:

  • Add an API client lock to the vault_identity_group_alias resource: (#​2140)

v3.24.0

Compare Source

FEATURES:

  • Add support for ext_key_usage_oids in vault_pki_secret_backend_role (#​2108)
  • Adds support to vault_gcp_auth_backend for common backend tune parameters (#​1997).
  • Adds support to vault_azure_secret_backend_role for sign_in_audience and tags. Requires Vault 1.16+. (#​2101).

BUGS:

  • fix vault_kv_secret_v2 drift when "data" is in secret name/path (#​2104)
  • fix vault_database_secret_backend_connection: allow mysql_rds,mysql_aurora,mysql_legacy options of vault_database_secret_backend_connection terraform resource to allow specifying tls_ca and tls_certificate_key (#​2106)
  • Fix ignored description updates for aws_secret_backend resource (#​2057)

IMPROVEMENTS:

  • Updated dependencies (#​2129):
    • cloud.google.com/go/iam v1.1.2 -> v1.1.5
    • github.com/Azure/azure-sdk-for-go/sdk/azcore v1.8.0 -> v1.9.1
    • github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.4.0 -> v1.5.0
    • github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources v1.1.1 -> v1.2.0
    • github.com/aws/aws-sdk-go v1.45.24 -> v1.49.22
    • github.com/google/uuid v1.3.1 -> v1.5.0
    • github.com/hashicorp/go-hclog v1.5.0 -> v1.6.2
    • github.com/hashicorp/go-retryablehttp v0.7.4 -> v0.7.5
    • github.com/hashicorp/go-secure-stdlib/parseutil v0.1.7 -> v0.1.8
    • github.com/hashicorp/terraform-plugin-sdk/v2 v2.29.0 -> v2.31.0
    • github.com/hashicorp/vault-plugin-auth-jwt v0.17.0 -> v0.18.0
    • github.com/hashicorp/vault/sdk v0.10.0 -> v0.10.2
    • golang.org/x/crypto v0.14.0 -> v0.18.0
    • golang.org/x/net v0.15.0 -> v0.20.0
    • golang.org/x/oauth2 v0.12.0 -> v0.16.0
    • google.golang.org/api v0.144.0 -> v0.156.0
    • google.golang.org/genproto v0.0.0-20231002182017-d307bd883b97 -> v0.0.0-20240116215550-a9fa1716bcac
    • k8s.io/utils v0.0.0-20230726121419-3b25d923346b -> v0.0.0-20240102154912-e7106e64919e

v3.23.0

Compare Source

FEATURES:

  • Add support for lazily authenticating to Vault: (#​2049)

BUGS:

  • Fix vault_identity_group loses externally managed policies on updates when external_policies = true (#​2084)
  • Fix regression in vault_azure_access_credentials where we returned prematurely on 401 responses:(#​2086)

v3.22.0

Compare Source

FEATURES:

  • Add support for configuring SAML Auth resources (#​2053)
  • Add support for custom_metadata on vault_namespace: (#​2033)
  • Add support for OCSP* role fields for the cert auth resource: (#​2056)
  • Add field set_namespace_from_token to Provider configuration (#​2070)
  • Support authenticating to the root namespace from within an auth_login*: (#​2066)

BUGS:

  • Fix panic when reading client_secret from a public oidc client (#​2048)
  • Fix API request missing roles field for mongodbatlas_secret_role resource (#​2047)
  • Fix bug when updating vault_azure_secret_backend_role: (#​2063)
  • Fix audience string ordering for auth_login_gcp causing GCE auth to fail (#​2064)

IMPROVEMENTS:

  • Updated dependencies: (#​2038)
    • github.com/aws/aws-sdk-go v1.44.106 -> v1.45.24
  • Updated dependencies: (#​2050)
    • github.com/Azure/azure-sdk-for-go/sdk/azcore v0.22.0 -> v1.8.0
    • github.com/Azure/azure-sdk-for-go/sdk/azidentity v0.13.2 -> v1.4.0
    • github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources v0.3.1 -> v1.1.1
    • github.com/Azure/go-autorest/autorest v0.11.29 removed

v3.21.0

Compare Source

FEATURES:

  • Add GCP CloudSQL support to Postgres, MySQL DB engines: (#​2012)
  • Add support for DB Adv TTL Mgmt: (#​2011)
  • Add support for setting not_before_duration argument on vault_ssh_secret_backend_role: (#​2019)
  • Add support for hmac key type and key_size to vault_transit_secret_backend_key: (#​2034)
  • Add support for roles to both rate limit and lease count quotas: (#​1994)
  • Add allowed_email_sans field to write and update functions of vault_cert_auth_backend_role: (#​1140)
  • Add support for local parameter in aws secret engine: (#​2013)

BUGS:

  • Fix duplicate timestamp and incorrect level messages: (#​2031)
  • Fix panic when setting key_usage to an array of empty string and enable it to unset the key usage constraints: (#​2036)
  • Add state migrator for external_member_group_ids in Identity Group (#​2043)
  • Fix drift detection for the kv-v2 secrets resource when disable_read is enabled: (#​2039)
  • Add state migrator in secrets/auth backends for disable_remount parameter (#​2037)
  • Fix failure when auth_login is specified and vault token is picked up from the runtime/execution environment: (#​2029)
  • Remove logging of password key: (#​2044)

IMPROVEMENTS:

  • Oracle DB engine enablement on HCP Vault: (#​2006)
  • Ensure sensitive values are masked in vault_approle_auth_backend_login plan output (#​2008)
  • Updated dependencies: (#​2038)
    • cloud.google.com/go/compute v1.10.0 removed
    • cloud.google.com/go/compute/metadata v0.2.3 added
    • cloud.google.com/go/iam v0.3.0 -> v1.1.2
    • github.com/Azure/go-autorest/autorest v0.11.24 -> v0.11.29
    • github.com/cenkalti/backoff/v4 v4.1.2 -> v4.2.1
    • github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f -> v0.0.0-20230601102743-20bbbf26f4d8
    • github.com/denisenkom/go-mssqldb v0.12.0 -> v0.12.3
    • github.com/go-sql-driver/mysql v1.6.0 -> v1.7.1
    • github.com/google/uuid v1.3.0 -> v1.3.1
    • github.com/gosimple/slug v1.11.0 -> v1.13.1
    • github.com/hashicorp/go-cty v1.4.1-0.20200414143053-d3edf31b6320 -> v1.4.1-0.20200723130312-85980079f637
    • github.com/hashicorp/go-retryablehttp v0.7.1 -> v0.7.4
    • github.com/hashicorp/terraform-plugin-sdk/v2 v2.16.0 -> v2.29.0
    • github.com/hashicorp/vault-plugin-auth-jwt v0.13.2-0.20221012184020-28cc68ee722b -> v0.17.0
    • github.com/hashicorp/vault-plugin-auth-kerberos v0.8.0 -> v0.10.1
    • github.com/hashicorp/vault-plugin-auth-oci v0.13.0-pre -> v0.14.2
    • github.com/hashicorp/vault/api v1.9.3-0.20230628215639-3ca33976762c -> v1.10.0
    • github.com/hashicorp/vault/sdk v0.6.0 -> v0.10.0
    • github.com/jcmturner/gokrb5/v8 v8.4.2 -> v8.4.4
    • golang.org/x/crypto v0.6.0 -> v0.14.0
    • golang.org/x/net v0.7.0 -> v0.15.0
    • golang.org/x/oauth2 v0.0.0-20221006150949-b44042a4b9c1 -> v0.12.0
    • google.golang.org/api v0.98.0 -> v0.144.0
    • google.golang.org/genproto v0.0.0-20221010155953-15ba04fc1c0e -> v0.0.0-20231002182017-d307bd883b97
    • k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9 -> v0.0.0-20230726121419-3b25d923346b

v3.20.1

Compare Source

IMPROVEMENTS:

  • Update dependencies (#​1958)
    • github.com/hashicorp/go-secure-stdlib/awsutil v0.1.6 -> v0.2.3
  • Add local variable to aws_secret_backend resource, in order to mark the mount as non - replicated

BUGS:

  • Update k8s-auth config to support unsetting the K8s CA Cert: (#​2005)

v3.20.0

Compare Source

FEATURES:

  • Add support for setting permanently_delete argument on resource_azure_secret_backend_role: (#​1958)
  • Add use_sts_region_from_client to AWS Auth Config: (#​1963)
  • Add accessor attribute for vault_gcp_auth_backend resource: (#​1980)

BUGS:

  • Fixes a panic that can occur when Vault lookup-self API returns nil token info (#​1978)
  • Resolve TF state for PKI Multi-Issuer workflows: (#​1973)
  • Check the seal-status on the default namespace: (#​1967)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@dezeroku dezeroku changed the title chore(deps): update terraform vault to ~> 3.20.0 chore(deps): update terraform vault to ~> 3.21.0 Oct 13, 2023
@dezeroku dezeroku changed the title chore(deps): update terraform vault to ~> 3.21.0 chore(deps): update terraform vault to ~> 3.22.0 Nov 5, 2023
@dezeroku dezeroku changed the title chore(deps): update terraform vault to ~> 3.22.0 chore(deps): update terraform vault to ~> 3.23.0 Nov 19, 2023
@dezeroku dezeroku changed the title chore(deps): update terraform vault to ~> 3.23.0 chore(deps): update terraform vault to ~> 3.24.0 Jan 21, 2024
@dezeroku dezeroku changed the title chore(deps): update terraform vault to ~> 3.24.0 chore(deps): update terraform vault to ~> 3.25.0 Feb 18, 2024
@dezeroku dezeroku closed this Oct 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants