-
Notifications
You must be signed in to change notification settings - Fork 0
feat(terraform): update hashicorp/vault ( 5.0.0 → 5.6.0 ) #198
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
techtales-bot
wants to merge
1
commit into
main
Choose a base branch
from
renovate/vault-5.x
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Contributor
Contributor
Author
🦙 MegaLinter status: ✅ SUCCESS
See detailed report in MegaLinter reports MegaLinter is graciously provided by OX Security |
1d67d28 to
209ad68
Compare
Contributor
209ad68 to
a06aa68
Compare
Contributor
a06aa68 to
76c04c4
Compare
Contributor
76c04c4 to
8be85cf
Compare
Contributor
8be85cf to
d72caae
Compare
Contributor
d72caae to
a8b37bc
Compare
Contributor
a8b37bc to
be8711a
Compare
Contributor
be8711a to
3c433e3
Compare
Contributor
3c433e3 to
27815a3
Compare
Contributor
27815a3 to
97812f2
Compare
Contributor
97812f2 to
35be3d9
Compare
2016861 to
59750bb
Compare
Contributor
59750bb to
9e65a84
Compare
Contributor
9e65a84 to
5877a32
Compare
Contributor
5877a32 to
86d9721
Compare
Contributor
86d9721 to
6d29536
Compare
Contributor
6d29536 to
bcf26a6
Compare
Contributor
bcf26a6 to
0d65995
Compare
Contributor
0d65995 to
5be7bfa
Compare
Contributor
5be7bfa to
5967c7a
Compare
Contributor
5967c7a to
0aedbe6
Compare
Contributor
0aedbe6 to
2c4bdc8
Compare
Contributor
2c4bdc8 to
2a2b938
Compare
Contributor
|
Ran Plan for dir: Plan Error |
2a2b938 to
8e17240
Compare
Contributor
| datasource | package | from | to | | ------------------ | --------------- | ----- | ----- | | terraform-provider | hashicorp/vault | 5.0.0 | 5.6.0 |
8e17240 to
b073d40
Compare
Contributor
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
5.0.0→5.6.0Release Notes
hashicorp/terraform-provider-vault (vault)
v5.6.0Compare Source
FEATURES:
IMPROVEMENTS:
BUGS:
v5.5.0Compare Source
BEHAVIOR CHANGES: With v5.5.0, the default value for
deny_null_bindin thevault_ldap_auth_backendresource has changed fromfalsetotrueto match with the Vault API defaults. Configurations that do not explicitly set
deny_null_bindwill now have it set totrueupon upgrade, andcustomers should verify that this change aligns with their intended LDAP authentication behavior. Furthermore, Customers should also consider
upgrading to Vault Community Edition 1.21.1 and Vault Enterprise 1.21.1, 1.20.6, 1.19.12, and 1.16.28, which no longer allows Vault to perform
unauthenticated or null binds against the LDAP server.
SECURITY:
vault_ldap_auth_backend: Fix incorrectdeny_null_binddefault. Setdeny_null_bindtotrueif not provided in configuration (#2622) (CVE-13357,HCSEC-2025-33)FEATURES:
alias_metadatafield in auth resources (#2547)not_before_durationfield invault_pki_secret_backend_root_cert(#2664)IMPROVEMENTS:
golang.org/x/cryptov0.41.0 -> v0.45.0golang.org/x/netv0.43.0 -> v0.47.0golang.org/x/modv0.26.0 -> v0.29.0golang.org/x/syncv0.16.0 -> v0.18.0golang.org/x/sysv0.35.0 -> v0.38.0golang.org/x/textv0.28.0 -> v0.31.0golang.org/x/toolsv0.35.0 -> v0.38.0v5.4.0Compare Source
BEHAVIOR CHANGES: Please refer to the upgrade topics
in the guide for details on all behavior changes.
FEATURES:
vault_terraform_cloud_secret_roleto support multi-team tokens, by @drewmullen (#2498)tuneinvault_saml_auth_backendresource (#2566)tuneinvault_ldap_auth_backendandvault_okta_auth_backendresources (#2602)allowed_sts_header_valuesparameter invault_aws_auth_backend_clientresource to specify additional headers allowed in STS requestsvault_gcp_secret_backendto support ttl and max_ttl, by @vijayavelsekar (#2627)request_timeout,dereference_aliases,enable_samaccountname_loginandanonymous_group_searchparameters invault_ldap_auth_backendresource.(#2634)max_retriesparameter invault_aws_secret_backendresource. (#2623)iam_alias,iam_metadata,gce_aliasandgce_metadatafields invault_gcp_auth_backendresource (#2636)role_idfield invault_gcp_auth_backend_roleresource (#2636)max_retries,retry_delay,max_retry_delay) tovault_azure_auth_backend_configresource for Azure API request resilience (#2629)vault_spiffe_auth_backend_configandvault_spiffe_auth_backend_role(#2620)mfa_serial_numberparameter invault_aws_secret_backend_roleresource. (#2637)persist_appparameters invault_azure_secret_backend_roleresource.(#2642)
BUGS:
vault_pki_secret_backend_crl_configresource to allow disabling flags previously set to true (#2615)vault_jwt_auth_backendresource (#2560)vault_github_auth_backendandvault_auth_backendresources (#2565)vault_saml_auth_backendresource (#2566)vault_gcp_auth_backendandvault_oci_auth_backendresources (#2596)v5.3.0Compare Source
FEATURES:
credential_typefield in thevault_ldap_secret_backendresource (#2548)IMPROVEMENTS:
BUGS:
azure_secret_backend_roleto prevent persistent diff for null value onmax_ttlandexplicit_max_ttlargument (#2581)v5.2.1Compare Source
BUGS:
auth_login_gcpfield constraint on fieldcredentialsservice_accountauth_login_azurefield constraint on fieldvmss_nametenant_idclient_idscopeauth_login_kerberosfield constraint on fieldsusernameservicerealmkrb5conf_pathkeytab_pathdisable_fast_negotiationremove_instance_nameauth_login_userpassfield constraint on fieldpassword_fileauth_loginfield constraint on fielduse_root_namespacev5.2.0Compare Source
FEATURES:
jwks_pairsinvault_jwt_auth_backendresource. Requires Vault 1.16+ (#2523)root_password_ttlinvault_azure_secret_backendresource. Requires Vault 1.15+ (#2529)vault_oci_auth_backendandvault_oci_auth_backend_roleto manage OCI auth backend and roles. (#1761)log_levelinvault_pki_secret_backend_config_scepresource. Requires Vault 1.20.1+ (#2525)IMPROVEMENTS:
golang.org/x/oauth2v0.24.0 -> v0.30.0github.com/cloudflare/circlv1.3.7 -> v1.6.1github.com/go-jose/go-jose/v3v3.0.3 -> v3.0.4github.com/go-jose/go-jose/v4v4.0.4 -> v4.1.2github.com/golang-jwt/jwt/v5v5.2.2 -> v5.3.0cloud.google.com/go/iamv1.2.2 -> v1.5.2cloud.google.com/go/compute/metadatav0.6.0 -> v0.8.0github.com/Azure/azure-sdk-for-go/sdk/azcorev1.11.1 -> v1.18.2github.com/aws/aws-sdk-gov1.55.6 -> v1.55.8github.com/go-sql-driver/mysqlv1.8.1 -> v1.9.3github.com/hashicorp/consul/apiv1.27.0 -> v1.32.1github.com/hashicorp/terraform-plugin-frameworkv1.14.1 -> 1.15.1github.com/hashicorp/terraform-plugin-framework-validatorsv0.17.0 -> v0.18.0hashicorp/ghaction-terraform-provider-releasev4.0.1 -> v5.0.0BUGS:
vault_gcp_secret_backendresource. (#2549)VAULT_NAMESPACEwas not being honored, causing child namespaces to be created in the root namespace instead (#2540)v5.1.0Compare Source
FEATURES:
Add support for key_usage to
vault_pki_secret_backend_root_sign_intermediate(#2421)Add
private_key_woandprivate_key_wo_versionfields to Snowflake DB secrets engine config (#2508)Add support for
group_byandsecondary_rateon resourcevault_quota_rate_limit. Requires Vault Enterprise 1.20.0+ (#2476)Add support for Transit CMAC endpoint (#2488)
Add new resource
vault_scep_auth_backend_roleto manage roles in a SCEP auth backend. #2479.Add new datasource and resource
vault_pki_secret_backend_config_scepfor PKI SCEP configuration. #2487.Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.