chore(deps): update terraform vault to v3.25.0 #39
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.15.2
->3.25.0
Release Notes
hashicorp/terraform-provider-vault (vault)
v3.25.0
Compare Source
FEATURES:
split_statements
anddisconnect_sessions
: (#2085)IMPROVEMENTS:
vault_identity_group_alias
resource: (#2140)v3.24.0
Compare Source
FEATURES:
ext_key_usage_oids
invault_pki_secret_backend_role
(#2108)vault_gcp_auth_backend
for common backend tune parameters (#1997).vault_azure_secret_backend_role
forsign_in_audience
andtags
. Requires Vault 1.16+. (#2101).BUGS:
vault_kv_secret_v2
drift when "data" is in secret name/path (#2104)vault_database_secret_backend_connection
: allow mysql_rds,mysql_aurora,mysql_legacy options of vault_database_secret_backend_connection terraform resource to allow specifying tls_ca and tls_certificate_key (#2106)description
updates foraws_secret_backend
resource (#2057)IMPROVEMENTS:
cloud.google.com/go/iam
v1.1.2 -> v1.1.5github.com/Azure/azure-sdk-for-go/sdk/azcore
v1.8.0 -> v1.9.1github.com/Azure/azure-sdk-for-go/sdk/azidentity
v1.4.0 -> v1.5.0github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources
v1.1.1 -> v1.2.0github.com/aws/aws-sdk-go
v1.45.24 -> v1.49.22github.com/google/uuid
v1.3.1 -> v1.5.0github.com/hashicorp/go-hclog
v1.5.0 -> v1.6.2github.com/hashicorp/go-retryablehttp
v0.7.4 -> v0.7.5github.com/hashicorp/go-secure-stdlib/parseutil
v0.1.7 -> v0.1.8github.com/hashicorp/terraform-plugin-sdk/v2
v2.29.0 -> v2.31.0github.com/hashicorp/vault-plugin-auth-jwt
v0.17.0 -> v0.18.0github.com/hashicorp/vault/sdk
v0.10.0 -> v0.10.2golang.org/x/crypto
v0.14.0 -> v0.18.0golang.org/x/net
v0.15.0 -> v0.20.0golang.org/x/oauth2
v0.12.0 -> v0.16.0google.golang.org/api
v0.144.0 -> v0.156.0google.golang.org/genproto
v0.0.0-20231002182017-d307bd883b97 -> v0.0.0-20240116215550-a9fa1716bcack8s.io/utils
v0.0.0-20230726121419-3b25d923346b -> v0.0.0-20240102154912-e7106e64919ev3.23.0
Compare Source
FEATURES:
BUGS:
vault_identity_group
loses externally managed policies on updates whenexternal_policies = true
(#2084)vault_azure_access_credentials
where we returned prematurely on 401 responses:(#2086)v3.22.0
Compare Source
FEATURES:
custom_metadata
onvault_namespace
: (#2033)OCSP*
role fields for the cert auth resource: (#2056)set_namespace_from_token
to Provider configuration (#2070)BUGS:
client_secret
from a public oidc client (#2048)roles
field formongodbatlas_secret_role
resource (#2047)vault_azure_secret_backend_role
: (#2063)auth_login_gcp
causing GCE auth to fail (#2064)IMPROVEMENTS:
github.com/aws/aws-sdk-go
v1.44.106 -> v1.45.24github.com/Azure/azure-sdk-for-go/sdk/azcore
v0.22.0 -> v1.8.0github.com/Azure/azure-sdk-for-go/sdk/azidentity
v0.13.2 -> v1.4.0github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/resources/armresources
v0.3.1 -> v1.1.1github.com/Azure/go-autorest/autorest
v0.11.29 removedv3.21.0
Compare Source
FEATURES:
not_before_duration
argument onvault_ssh_secret_backend_role
: (#2019)hmac
key type and key_size tovault_transit_secret_backend_key
: (#2034)allowed_email_sans
field to write and update functions ofvault_cert_auth_backend_role
: (#1140)local
parameter in aws secret engine: (#2013)BUGS:
key_usage
to an array of empty string and enable it to unset the key usage constraints: (#2036)external_member_group_ids
in Identity Group (#2043)disable_read
is enabled: (#2039)disable_remount
parameter (#2037)auth_login
is specified and vault token is picked up from the runtime/execution environment: (#2029)IMPROVEMENTS:
vault_approle_auth_backend_login
plan output (#2008)cloud.google.com/go/compute
v1.10.0 removedcloud.google.com/go/compute/metadata
v0.2.3 addedcloud.google.com/go/iam
v0.3.0 -> v1.1.2github.com/Azure/go-autorest/autorest
v0.11.24 -> v0.11.29github.com/cenkalti/backoff/v4
v4.1.2 -> v4.2.1github.com/coreos/pkg
v0.0.0-20180928190104-399ea9e2e55f -> v0.0.0-20230601102743-20bbbf26f4d8github.com/denisenkom/go-mssqldb
v0.12.0 -> v0.12.3github.com/go-sql-driver/mysql
v1.6.0 -> v1.7.1github.com/google/uuid
v1.3.0 -> v1.3.1github.com/gosimple/slug
v1.11.0 -> v1.13.1github.com/hashicorp/go-cty
v1.4.1-0.20200414143053-d3edf31b6320 -> v1.4.1-0.20200723130312-85980079f637github.com/hashicorp/go-retryablehttp
v0.7.1 -> v0.7.4github.com/hashicorp/terraform-plugin-sdk/v2
v2.16.0 -> v2.29.0github.com/hashicorp/vault-plugin-auth-jwt
v0.13.2-0.20221012184020-28cc68ee722b -> v0.17.0github.com/hashicorp/vault-plugin-auth-kerberos
v0.8.0 -> v0.10.1github.com/hashicorp/vault-plugin-auth-oci
v0.13.0-pre -> v0.14.2github.com/hashicorp/vault/api
v1.9.3-0.20230628215639-3ca33976762c -> v1.10.0github.com/hashicorp/vault/sdk
v0.6.0 -> v0.10.0github.com/jcmturner/gokrb5/v8
v8.4.2 -> v8.4.4golang.org/x/crypto
v0.6.0 -> v0.14.0golang.org/x/net
v0.7.0 -> v0.15.0golang.org/x/oauth2
v0.0.0-20221006150949-b44042a4b9c1 -> v0.12.0google.golang.org/api
v0.98.0 -> v0.144.0google.golang.org/genproto
v0.0.0-20221010155953-15ba04fc1c0e -> v0.0.0-20231002182017-d307bd883b97k8s.io/utils
v0.0.0-20220210201930-3a6ce19ff2f9 -> v0.0.0-20230726121419-3b25d923346bv3.20.1
Compare Source
IMPROVEMENTS:
v0.1.6
->v0.2.3
local
variable toaws_secret_backend
resource, in order to mark the mount as non - replicatedBUGS:
v3.20.0
Compare Source
FEATURES:
permanently_delete
argument onresource_azure_secret_backend_role
: (#1958)use_sts_region_from_client
to AWS Auth Config: (#1963)vault_gcp_auth_backend
resource: (#1980)BUGS:
v3.19.0
Compare Source
FEATURES:
use_sts_region_from_client
invault_aws_auth_backend_client
available in Vault v1.15.0+: (#1963)BUGS:
vault_identity_entity
to exclude policies from Vault request ifexternal_policies
istrue
: (#1950)v3.18.0
Compare Source
FEATURES:
auth_login_token_file
method: (#1928)BUGS:
v3.17.0
Compare Source
FEATURES:
max_page_size
in thevault_ldap_auth_backend
: (#1878)BUGS:
v3.16.0
Compare Source
FEATURES:
vault_auth_backends
: (#1827)IMPROVEMENTS:
BUGS:
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.