Releases: hashicorp/terraform-provider-vault
Releases · hashicorp/terraform-provider-vault
v3.22.0
3.22.0 (Nov 1, 2023)
FEATURES:
- Add support for configuring SAML Auth resources (#2053)
- Add support for
custom_metadata
onvault_namespace
: (#2033) - Add support for
OCSP*
role fields for the cert auth resource: (#2056) - Add field
set_namespace_from_token
to Provider configuration (#2070) - Support authenticating to the root namespace from within an auth_login*: (#2066)
BUGS:
- Fix panic when reading
client_secret
from a public oidc client (#2048) - Fix API request missing
roles
field formongodbatlas_secret_role
resource (#2047) - Fix bug when updating
vault_azure_secret_backend_role
: (#2063) - Fix audience string ordering for
auth_login_gcp
causing GCE auth to fail (#2064)
IMPROVEMENTS:
- Updated dependencies: (#2038)
github.com/aws/aws-sdk-go
v1.44.106 -> v1.45.24
- Updated dependencies: (#2050)
github.com/Azure/azure-sdk-for-go/sdk/azcore
v0.22.0 -> v1.8.0github.com/Azure/azure-sdk-for-go/sdk/azidentity
v0.13.2 -> v1.4.0github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources
v0.3.1 -> v1.1.1github.com/Azure/go-autorest/autorest
v0.11.29 removed
v3.21.0
3.21.0 (Oct 9, 2023)
FEATURES:
- Add GCP CloudSQL support to Postgres, MySQL DB engines: (#2012)
- Add support for DB Adv TTL Mgmt: (#2011)
- Add support for setting
not_before_duration
argument onvault_ssh_secret_backend_role
: (#2019) - Add support for
hmac
key type and key_size tovault_transit_secret_backend_key
: (#2034) - Add support for roles to both rate limit and lease count quotas: (#1994)
- Add
allowed_email_sans
field to write and update functions ofvault_cert_auth_backend_role
: (#1140) - Add support for
local
parameter in aws secret engine: (#2013)
BUGS:
- Fix duplicate timestamp and incorrect level messages: (#2031)
- Fix panic when setting
key_usage
to an array of empty string and enable it to unset the key usage constraints: (#2036) - Add state migrator for
external_member_group_ids
in Identity Group (#2043) - Fix drift detection for the kv-v2 secrets resource when
disable_read
is enabled: (#2039) - Add state migrator in secrets/auth backends for
disable_remount
parameter (#2037) - Fix failure when
auth_login
is specified and vault token is picked up from the runtime/execution environment: (#2029) - Remove logging of password key: (#2044)
IMPROVEMENTS:
- Oracle DB engine enablement on HCP Vault: (#2006)
- Ensure sensitive values are masked in
vault_approle_auth_backend_login
plan output (#2008) - Updated dependencies: (#2038)
cloud.google.com/go/compute
v1.10.0 removedcloud.google.com/go/compute/metadata
v0.2.3 addedcloud.google.com/go/iam
v0.3.0 -> v1.1.2github.com/Azure/go-autorest/autorest
v0.11.24 -> v0.11.29github.com/cenkalti/backoff/v4
v4.1.2 -> v4.2.1github.com/coreos/pkg
v0.0.0-20180928190104-399ea9e2e55f -> v0.0.0-20230601102743-20bbbf26f4d8github.com/denisenkom/go-mssqldb
v0.12.0 -> v0.12.3github.com/go-sql-driver/mysql
v1.6.0 -> v1.7.1github.com/google/uuid
v1.3.0 -> v1.3.1github.com/gosimple/slug
v1.11.0 -> v1.13.1github.com/hashicorp/go-cty
v1.4.1-0.20200414143053-d3edf31b6320 -> v1.4.1-0.20200723130312-85980079f637github.com/hashicorp/go-retryablehttp
v0.7.1 -> v0.7.4github.com/hashicorp/terraform-plugin-sdk/v2
v2.16.0 -> v2.29.0github.com/hashicorp/vault-plugin-auth-jwt
v0.13.2-0.20221012184020-28cc68ee722b -> v0.17.0github.com/hashicorp/vault-plugin-auth-kerberos
v0.8.0 -> v0.10.1github.com/hashicorp/vault-plugin-auth-oci
v0.13.0-pre -> v0.14.2github.com/hashicorp/vault/api
v1.9.3-0.20230628215639-3ca33976762c -> v1.10.0github.com/hashicorp/vault/sdk
v0.6.0 -> v0.10.0github.com/jcmturner/gokrb5/v8
v8.4.2 -> v8.4.4golang.org/x/crypto
v0.6.0 -> v0.14.0golang.org/x/net
v0.7.0 -> v0.15.0golang.org/x/oauth2
v0.0.0-20221006150949-b44042a4b9c1 -> v0.12.0google.golang.org/api
v0.98.0 -> v0.144.0google.golang.org/genproto
v0.0.0-20221010155953-15ba04fc1c0e -> v0.0.0-20231002182017-d307bd883b97k8s.io/utils
v0.0.0-20220210201930-3a6ce19ff2f9 -> v0.0.0-20230726121419-3b25d923346b
v3.20.1
3.20.1 (Sep 13, 2023)
IMPROVEMENTS:
- Update dependencies (#1958)
- github.com/hashicorp/go-secure-stdlib/awsutil
v0.1.6
->v0.2.3
- github.com/hashicorp/go-secure-stdlib/awsutil
BUGS:
- Update k8s-auth config to support unsetting the K8s CA Cert: (#2005)
CHANGES:
vault_kubernetes_auth_backend_config
: prior to vault-1.9.3, the k8s-auth engine would store the K8S CA cert in its configuration if Vault was running in K8s. Post vault-1.9.3, this behaviour was changed to no longer store the K8s CA cert in config. That change confuses TFVP since thekubernetes_ca_cert
field can no longer be computed. This fix detects and remedies the issue by adding the ability to "unset" the CA cert in the case where we are provisioning vault-1.9.3+. It should also clean up any K8s CA cert that was left behind after upgrading from any Vault version prior to 1.9.3 withdisable_local_ca_jwt=false
andkubernetes_ca_cert
is either unset or set to""
.
v3.20.0
FEATURES:
- Add support for setting
permanently_delete
argument onresource_azure_secret_backend_role
: (#1958) - Add
use_sts_region_from_client
to AWS Auth Config: (#1963) - Add accessor attribute for
vault_gcp_auth_backend
resource: (#1980)
BUGS:
- Fixes a panic that can occur when Vault lookup-self API returns nil token info (#1978)
- Resolve TF state for PKI Multi-Issuer workflows: (#1973)
- Check the seal-status on the default namespace: (#1967)
v3.19.0
3.19.0 (Aug 2, 2023)
FEATURES:
- Add support for User ID configuration for PKI Secrets Engine: (#1936)
BUGS:
v3.18.0
v3.17.0
v3.16.0
FEATURES:
- Add support for LDAP secrets engine: (#1859)
- Add new data source
vault_auth_backends
: (#1827) - Support allowed_domains_template on ssh_secret_backend_role. Fixes #1675: (#1676)
IMPROVEMENTS:
- Add support for retrying kv-v2 secret data writes: (#1887)
- Add back support for deriving the provider namespace from the Vault token's: (#1841)
BUGS: