Update dependency hashicorp/terraform-provider-vault to v4 #254
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.22.0
->4.4.0
Release Notes
hashicorp/terraform-provider-vault (hashicorp/terraform-provider-vault)
v4.4.0
Compare Source
FEATURES:
vault_aws_secret_backend_role
to support settingsession_tags
andexternal_id
(#2290)BUGS:
vault_ssh_secret_backend_ca
where a schema change forced the resource to be replaced (#2308)v4.3.0
Compare Source
FEATURES:
iam_tags
invault_aws_secret_backend_role
(#2231).inheritable
onvault_quota_rate_limit
andvault_quota_lease_count
. Requires Vault 1.15+.: (#2133).vault_gcp_secret_backend
. Requires Vault 1.17+. Available only for Vault Enterprise (#2249).vault_azure_secret_backend
. Requires Vault 1.17+. Available only for Vault Enterprise (#2250)vault_aws_auth_backend_client
. Requires Vault 1.17+. Available only for Vault Enterprise (#2243).vault_gcp_auth_backend
(#2256)vault_azure_auth_backend_config
. Requires Vault 1.17+. Available only for Vault Enterprise (#2254).vault_pki_secret_backend_config_est
. Requires Vault 1.16+. Available only for Vault Enterprise (#2246)vault_okta_auth_backend
resource: (#2210)max_retries
invault_aws_auth_backend_client
: (#2270)vault_plugin
andvault_plugin_pinned_version
: (#2159)key_type
andkey_bits
tovault_ssh_secret_backend_ca
: (#1454)IMPROVEMENTS:
vault_jwt_auth_backend_role
resource: (#2232)github.com/hashicorp/vault
package: (#2251)custom_tags
andsecret_name_template
fields tovault_secrets_sync_azure_destination
resource (#2247)v4.2.0
Compare Source
FEATURES:
granularity
to Secrets Sync destination resources. Requires Vault 1.16+ Enterprise. (#2202)allowed_kubernetes_namespace_selector
invault_kubernetes_secret_backend_role
(#2180).vault_namespace
. Requires Vault Enterprise: (#2208).vault_namespaces
. Requires Vault Enterprise: (#2212).IMPROVEMENTS:
BUGS:
vault_approle_auth_backend_role_secret_id
regression to handle 404 errors (#2204)vault_kv_secret
andvault_kv_secret_v2
failure to update secret data modified outside terraform (#2207)vault_kv_secret_v2
failing on imported resource when data_json should be ignored (#2207)v4.1.0
Compare Source
CHANGES TO VAULT POLICY REQUIREMENTS:
The v4.0.0 release required read permissions at
sys/auth/:path
which was asudo endpoint. The v4.1.0 release changed that to instead require permissions
at the
sys/mounts/auth/:path
level and sudo is no longer required. Pleaserefer to the details in the Terraform Vault Provider 4.0.0 Upgrade Guide.
FEATURES:
vault_config_ui_custom_message
. Requires Vault 1.16+ Enterprise: (#2154).IMPROVEMENTS:
BUGS:
vault_azure_access_credentials
to default to Azure Public Cloud (#2190)v4.0.0
Compare Source
Important: This release requires read policies to be set at the path level for mount metadata.
For example, instead of permissions at
sys/auth
you must set permissions atthe
sys/auth/:path
level. Please refer to the details in theTerraform Vault Provider 4.0.0 Upgrade Guide.
FEATURES:
vault_pki_secret_backend_config_cluster
resource. Requires Vault 1.13+ (#1949).enable_templating
invault_pki_secret_backend_config_urls
(#2147).skip_import_rotation
andskip_static_role_import_rotation
inldap_secret_backend_static_role
andldap_secret_backend
respectively. Requires Vault 1.16+ (#2128).vault_plugin
andvault_plugin_pinned_version
resources for managing external plugins (#2159)IMPROVEMENTS:
version
in returned values forvault_kv_secret_v2
data source: (#2095)BUGS:
vault_ldap_secret_backend_static_role
,vault_ldap_secret_backend_library_set
, andvault_ldap_secret_backend_static_role
(#2156).v3.25.0
Compare Source
FEATURES:
split_statements
anddisconnect_sessions
: (#2085)IMPROVEMENTS:
vault_identity_group_alias
resource: (#2140)v3.24.0
Compare Source
FEATURES:
ext_key_usage_oids
invault_pki_secret_backend_role
(#2108)vault_gcp_auth_backend
for common backend tune parameters (#1997).vault_azure_secret_backend_role
forsign_in_audience
andtags
. Requires Vault 1.16+. (#2101).BUGS:
vault_kv_secret_v2
drift when "data" is in secret name/path (#2104)vault_database_secret_backend_connection
: allow mysql_rds,mysql_aurora,mysql_legacy options of vault_database_secret_backend_connection terraform resource to allow specifying tls_ca and tls_certificate_key (#2106)description
updates foraws_secret_backend
resource (#2057)IMPROVEMENTS:
cloud.google.com/go/iam
v1.1.2 -> v1.1.5github.com/Azure/azure-sdk-for-go/sdk/azcore
v1.8.0 -> v1.9.1github.com/Azure/azure-sdk-for-go/sdk/azidentity
v1.4.0 -> v1.5.0github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources
v1.1.1 -> v1.2.0github.com/aws/aws-sdk-go
v1.45.24 -> v1.49.22github.com/google/uuid
v1.3.1 -> v1.5.0github.com/hashicorp/go-hclog
v1.5.0 -> v1.6.2github.com/hashicorp/go-retryablehttp
v0.7.4 -> v0.7.5github.com/hashicorp/go-secure-stdlib/parseutil
v0.1.7 -> v0.1.8github.com/hashicorp/terraform-plugin-sdk/v2
v2.29.0 -> v2.31.0github.com/hashicorp/vault-plugin-auth-jwt
v0.17.0 -> v0.18.0github.com/hashicorp/vault/sdk
v0.10.0 -> v0.10.2golang.org/x/crypto
v0.14.0 -> v0.18.0golang.org/x/net
v0.15.0 -> v0.20.0golang.org/x/oauth2
v0.12.0 -> v0.16.0google.golang.org/api
v0.144.0 -> v0.156.0google.golang.org/genproto
v0.0.0-20231002182017-d307bd883b97 -> v0.0.0-20240116215550-a9fa1716bcack8s.io/utils
v0.0.0-20230726121419-3b25d923346b -> v0.0.0-20240102154912-e7106e64919ev3.23.0
Compare Source
FEATURES:
BUGS:
vault_identity_group
loses externally managed policies on updates whenexternal_policies = true
(#2084)vault_azure_access_credentials
where we returned prematurely on 401 responses:(#2086)Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.