Skip to content

Commit

Permalink
Upgrade terraform-provider-vault to v4.4.0 (#581)
Browse files Browse the repository at this point in the history
This PR was generated via `$ upgrade-provider pulumi/pulumi-vault`.

---

- Updating Java Gen version from 0.12.0 to 0.13.0.
- Upgrading terraform-provider-vault from 4.3.0  to 4.4.0.
	Fixes #580
  • Loading branch information
iwahbe authored Aug 8, 2024
1 parent 113aa2b commit 07153f7
Show file tree
Hide file tree
Showing 175 changed files with 1,792 additions and 204 deletions.
2 changes: 1 addition & 1 deletion .pulumi-java-gen.version
Original file line number Diff line number Diff line change
@@ -1 +1 @@
0.12.0
0.13.0
1 change: 0 additions & 1 deletion patches/0001-dummy-for-module-resolution.patch

This file was deleted.

14 changes: 14 additions & 0 deletions patches/0001-empty.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
From: Ian Wahbe <[email protected]>
Date: Thu, 8 Aug 2024 10:53:10 +0200
Subject: [PATCH] empty


diff --git a/empty.md b/empty.md
new file mode 100644
index 00000000..cc4b43f2
--- /dev/null
+++ b/empty.md
@@ -0,0 +1,2 @@
+This patch is intentionally empty so we can use the `upstream` submodule for dependency
+resolution, since the upstream provider does not follow Go module versioning standards.
41 changes: 37 additions & 4 deletions provider/cmd/pulumi-resource-vault/schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -8154,6 +8154,10 @@
"type": "integer",
"description": "The default TTL in seconds for STS credentials.\nWhen a TTL is not specified when STS credentials are requested,\nand a default TTL is specified on the role,\nthen this default TTL will be used. Valid only when `credential_type` is one of\n`assumed_role` or `federation_token`.\n"
},
"externalId": {
"type": "string",
"description": "External ID to set for assume role creds. \nValid only when `credential_type` is set to `assumed_role`.\n"
},
"iamGroups": {
"type": "array",
"items": {
Expand Down Expand Up @@ -8202,6 +8206,13 @@
},
"description": "Specifies the ARNs of the AWS roles this Vault role\nis allowed to assume. Required when `credential_type` is `assumed_role` and\nprohibited otherwise.\n"
},
"sessionTags": {
"type": "object",
"additionalProperties": {
"type": "string"
},
"description": "A map of strings representing key/value pairs to be set\nduring assume role creds creation. Valid only when `credential_type` is set to\n`assumed_role`.\n"
},
"userPath": {
"type": "string",
"description": "The path for the user name. Valid only when \n`credential_type` is `iam_user`. Default is `/`.\n"
Expand All @@ -8228,6 +8239,10 @@
"type": "integer",
"description": "The default TTL in seconds for STS credentials.\nWhen a TTL is not specified when STS credentials are requested,\nand a default TTL is specified on the role,\nthen this default TTL will be used. Valid only when `credential_type` is one of\n`assumed_role` or `federation_token`.\n"
},
"externalId": {
"type": "string",
"description": "External ID to set for assume role creds. \nValid only when `credential_type` is set to `assumed_role`.\n"
},
"iamGroups": {
"type": "array",
"items": {
Expand Down Expand Up @@ -8279,6 +8294,13 @@
"description": "Specifies the ARNs of the AWS roles this Vault role\nis allowed to assume. Required when `credential_type` is `assumed_role` and\nprohibited otherwise.\n",
"willReplaceOnChanges": true
},
"sessionTags": {
"type": "object",
"additionalProperties": {
"type": "string"
},
"description": "A map of strings representing key/value pairs to be set\nduring assume role creds creation. Valid only when `credential_type` is set to\n`assumed_role`.\n"
},
"userPath": {
"type": "string",
"description": "The path for the user name. Valid only when \n`credential_type` is `iam_user`. Default is `/`.\n"
Expand All @@ -8304,6 +8326,10 @@
"type": "integer",
"description": "The default TTL in seconds for STS credentials.\nWhen a TTL is not specified when STS credentials are requested,\nand a default TTL is specified on the role,\nthen this default TTL will be used. Valid only when `credential_type` is one of\n`assumed_role` or `federation_token`.\n"
},
"externalId": {
"type": "string",
"description": "External ID to set for assume role creds. \nValid only when `credential_type` is set to `assumed_role`.\n"
},
"iamGroups": {
"type": "array",
"items": {
Expand Down Expand Up @@ -8355,6 +8381,13 @@
"description": "Specifies the ARNs of the AWS roles this Vault role\nis allowed to assume. Required when `credential_type` is `assumed_role` and\nprohibited otherwise.\n",
"willReplaceOnChanges": true
},
"sessionTags": {
"type": "object",
"additionalProperties": {
"type": "string"
},
"description": "A map of strings representing key/value pairs to be set\nduring assume role creds creation. Valid only when `credential_type` is set to\n`assumed_role`.\n"
},
"userPath": {
"type": "string",
"description": "The path for the user name. Valid only when \n`credential_type` is `iam_user`. Default is `/`.\n"
Expand Down Expand Up @@ -17048,7 +17081,7 @@
},
"listingVisibility": {
"type": "string",
"description": "Specifies whether to show this mount in the UI-specific listing endpoint\n"
"description": "Specifies whether to show this mount in the UI-specific\nlisting endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.\n"
},
"local": {
"type": "boolean",
Expand Down Expand Up @@ -17158,7 +17191,7 @@
},
"listingVisibility": {
"type": "string",
"description": "Specifies whether to show this mount in the UI-specific listing endpoint\n"
"description": "Specifies whether to show this mount in the UI-specific\nlisting endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.\n"
},
"local": {
"type": "boolean",
Expand Down Expand Up @@ -17272,7 +17305,7 @@
},
"listingVisibility": {
"type": "string",
"description": "Specifies whether to show this mount in the UI-specific listing endpoint\n"
"description": "Specifies whether to show this mount in the UI-specific\nlisting endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.\n"
},
"local": {
"type": "boolean",
Expand Down Expand Up @@ -32663,7 +32696,7 @@
}
},
"vault:identity/getEntity:getEntity": {
"description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst entity = vault.identity.getEntity({\n entityName: \"entity_12345\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nentity = vault.identity.get_entity(entity_name=\"entity_12345\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var entity = Vault.Identity.GetEntity.Invoke(new()\n {\n EntityName = \"entity_12345\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := identity.LookupEntity(ctx, \u0026identity.LookupEntityArgs{\n\t\t\tEntityName: pulumi.StringRef(\"entity_12345\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetEntityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var entity = IdentityFunctions.getEntity(GetEntityArgs.builder()\n .entityName(\"entity_12345\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n entity:\n fn::invoke:\n Function: vault:identity:getEntity\n Arguments:\n entityName: entity_12345\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `create` capability on `/identity/lookup/entity`.\n",
"description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as vault from \"@pulumi/vault\";\n\nconst entity = vault.identity.getEntity({\n entityName: \"entity_12345\",\n});\n```\n```python\nimport pulumi\nimport pulumi_vault as vault\n\nentity = vault.identity.get_entity(entity_name=\"entity_12345\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Vault = Pulumi.Vault;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var entity = Vault.Identity.GetEntity.Invoke(new()\n {\n EntityName = \"entity_12345\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/identity\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := identity.LookupEntity(ctx, \u0026identity.LookupEntityArgs{\n\t\t\tEntityName: pulumi.StringRef(\"entity_12345\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.vault.identity.IdentityFunctions;\nimport com.pulumi.vault.identity.inputs.GetEntityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var entity = IdentityFunctions.getEntity(GetEntityArgs.builder()\n .entityName(\"entity_12345\")\n .build());\n\n }\n}\n```\n```yaml\nvariables:\n entity:\n fn::invoke:\n Function: vault:identity:getEntity\n Arguments:\n entityName: entity_12345\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Required Vault Capabilities\n\nUse of this resource requires the `update` capability on `/identity/lookup/entity`.\n",
"inputs": {
"description": "A collection of arguments for invoking getEntity.\n",
"properties": {
Expand Down
2 changes: 1 addition & 1 deletion provider/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ require (
github.com/deckarep/golang-set/v2 v2.5.0 // indirect
github.com/distribution/reference v0.6.0 // indirect
github.com/djherbis/times v1.5.0 // indirect
github.com/docker/docker v25.0.5+incompatible // indirect
github.com/docker/docker v25.0.6+incompatible // indirect
github.com/docker/go-connections v0.4.0 // indirect
github.com/docker/go-units v0.5.0 // indirect
github.com/edsrzf/mmap-go v1.1.0 // indirect
Expand Down
4 changes: 2 additions & 2 deletions provider/go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -1698,8 +1698,8 @@ github.com/docker/docker v20.10.17+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05
github.com/docker/docker v20.10.20+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk=
github.com/docker/docker v24.0.5+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk=
github.com/docker/docker v24.0.9+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk=
github.com/docker/docker v25.0.5+incompatible h1:UmQydMduGkrD5nQde1mecF/YnSbTOaPeFIeP5C4W+DE=
github.com/docker/docker v25.0.5+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk=
github.com/docker/docker v25.0.6+incompatible h1:5cPwbwriIcsua2REJe8HqQV+6WlWc1byg2QSXzBxBGg=
github.com/docker/docker v25.0.6+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk=
github.com/docker/docker-credential-helpers v0.6.3/go.mod h1:WRaJzqw3CTB9bk10avuGsjVBZsD05qeibJ1/TYlvc0Y=
github.com/docker/docker-credential-helpers v0.6.4/go.mod h1:ofX3UI0Gz1TteYBjtgs07O36Pyasyp66D2uKT7H8W1c=
github.com/docker/docker-credential-helpers v0.7.0/go.mod h1:rETQfLdHNT3foU5kuNkFR1R1V12OJRRO5lzt2D1b5X0=
Expand Down
57 changes: 57 additions & 0 deletions sdk/dotnet/Aws/SecretBackendRole.cs

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

4 changes: 2 additions & 2 deletions sdk/dotnet/Identity/GetEntity.cs

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

9 changes: 6 additions & 3 deletions sdk/dotnet/Mount.cs

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit 07153f7

Please sign in to comment.