BUG FIXES:
vault_approle_auth_backend_role: Fix perpetual diff whenpoliciesandperiodare updated to betoken_policiesandtoken_period(#744).
FEATURES:
- Add
vault_azure_access_credentialsdata source that retries creds before returning them (#713). - To
vault_database_secret_backend_connection, add support for theelasticsearch-database-plugin(#704).
IMPROVEMENTS:
- Add
add_address_to_envargument to set the value of the provider's address argument as the VAULT_ADDR environment variable in the Terraform process, enabling VAULT_ADDR external token helpers to work with this provider (#651). - Provide the ability to encrypt generated tokens using Keybase when using
/auth/token/create,/auth/token/create-orphan, or/auth/token/create/{role_name}(#686).
BUG FIXES:
- In
vault_aws_auth_backend_role, allowrole_arnsandpolicy_arnsto be used together (#710).
FEATURES:
- Add
vault_alicloud_auth_backend_roleresource (#673).
IMPROVEMENTS:
- Allow
/character in the group_name field of theokta_auth_backend_groupresource (#687). - Support
not_before_durationproperty inpki_secret_backend_role(#698).
BUG FIXES:
- Fix
vault_cert_auth_backend_roledeletion (#690). - Fix
use_token_groupschanges not being applied properly invault_ldap_auth_backendresource (#674).
IMPROVEMENTS:
- Adds ability to choose a specific AWS ARN in vault_aws_access_credentials when a Vault role has multiple ARNs configured (#661).
- Updates to Go 1.13 (#642).
- Adds doc on multiple namespace support (#654).
- Sorts
vault_policy_documentdata source allowed/denied parameters by key name (#656). - Adds support to
vault_auth_backendfor common backend tune parameters. Also allows updating Max TTL, Default TTL and Visibility Listing tuning settings onvault_auth_backendwithout forcing a new resource (#650).
BUG FIXES:
- Fix panic when reading unconfigured PKI mount URLs (#641).
- Update JWT bound_audiences to be optional (649).
- Solves permanent diff with the Mongo database connection URL (#659 and #662).
- Fixes an issue where the "vault_ldap_auth_backend_user" resource did not respect an empty
groupsvalue (#655).
BUG FIXES:
- For the
/gcp/configendpoint, fixes issue where credentials weren't being updated when changed (#635). - For the
/aws/config/rootendpoint, no longer requiresaccess_keyorsecret_key(#634).
FEATURES:
- For the
/sys/authendpoint, adds a new data source (#606).
IMPROVEMENTS:
- For the Vault child token created for Terraform to use during a run, adds a
token_namefield for easier identification in Vault (#594). - For the
/ssh/roles/{role}endpoint, adds support forallowed_user_key_lengths(#605). - For the
/sys/mounts/{path}endpoint, adds support forseal_wrap(#616). - For the
/auth/kubernetes/configendpoints, adds support forissuer(#601). - For the
/auth/kubernetes/role/{name}endpoints, adds support foraudience(#601).
BUG FIXES:
- For the
/identity/entity-aliasendpoint, fixes updates to thenamefield (#610).
FEATURES:
- Adds a resource for the
/database/static-roles/{name}endpoint (#577). - Adds a resource for the
/identity/lookup/entityendpoint (#587).
IMPROVEMENTS:
- Improved deprecation notices for Vault 1.2 token.* fields (#565).
- Adds new JWT Auth role fields introduced with Vault 1.2 (#566).
- Eliminates the need to add an outer delay while waiting for AWS creds to propagate (#571).
- For the
/consul/roles/{name}endpoint, adds support forttl,max_ttl,token_type, andlocalfields (#581). - For the
/sys/namespaces/{path}endpoint, uses thepathfor the namespace ID to allow imports (#570).
BUG FIXES:
- Fix panic when trying to write an entity alias that already exists (#573).
IMPROVEMENTS:
- Migrates to using the standalone Terraform plugin SDK (#558).
FEATURES:
- Adds support for alternative auth methods using a method-agnostic implementation (#552).
- Adds a resource for the "/consul/roles/{name}" endpoint (#480).
- Adds a resource for the "/pki/config/crl" endpoint (#506).
IMPROVEMENTS:
- Adds support for Vault 1.2+ token fields to LDAP auth (#553)
- Adds support for configuring the Transit cache (#548)
- Adds support for updates to the identity group alias field (#536).
- Adds support for reading the AWS access key and region from the AWS client config (#539).
- In AWS auth, only updates the access key and secret if they've changed (#540).
- Adds support for
"root_rotation_statements"in the database secret engine's connection params (#530). - Adds support for
token_typeandallowed_response_headersin Github and JWT auth backends (#556)
BUG FIXES:
- Fixes incorrect handling of user and team policies in the Github auth backend (#543).
IMPROVEMENTS:
- Adds support for importing roles in "vault_gcp_auth_backend_role" (#517).
- Adds support for importing groups in "vault_okta_auth_backend_group" (#514).
- Adds JWKS configuration options to "vault_jwt_auth_backend" (#483).
- Adds support for response wrapping to "vault_approle_auth_backend_role_secret_id" (#518).
BUG FIXES:
- Fixes an issue where using mount type "kv-v2" in "vault_mount" would continuously recreate the resource (#515).
- Fixes an issue where the "vault_token" resource would try to renew the access token instead of the resource token (#423).
- In the "vault_gcp_auth_backend", marks "credentials" as optional rather than required (#509).
- Fixes an issue where "vault_pki_secret_backend_config_urls" was forming an invalid URL for updating (#512).
FEATURES:
- Adds a datasource for the "/identity/lookup/entity" and "/identity/lookup/group" endpoints (#494).
- Adds a resource for the "/azure/roles/{name}" endpoint (#493).
- Adds a resource for the "/identity/oidc/config", "/identity/oidc/key/{name}", "/identity/oidc/key/{key_name}", and "/identity/oidc/role/{name}" endpoints (#488).
- Adds a resource for the "/transit/keys/{name}" endpoint (#477).
- Adds a resource for the "/sys/mfa/method/duo/{name}" endpoint (#443).
- Adds a resource for the "/azure/config" endpoint (#481).
IMPROVEMENTS:
- Adds a lock to prevent races in identity group resources (#492 and #495).
- Adds support for new common token fields on roles that were introduced in Vault 1.2.0 (#478 and #487).
- Adds the ability to run a coverage report to learn what Vault OpenAPI endpoints are and aren't supported (#466).
- Exposes the "local" flag on the
vault_mountresource (#462).
BUG FIXES:
resource/aws_auth_backend_client: Backend supports nested paths [#461]- Adds "ForceNew" to the "groupname" parameter on the LDAP auth groups endpoint so if there's a change, the old group is deleted (#465).
- Fixes issue with a permanent diff in
vault_gcp_secret_roleset(#476).
IMPROVEMENTS:
- For
aws_secret_backend_role, adds support fordefault_sts_ttlandmax_sts_ttl(#444).
BUG FIXES:
- Fixes ordering issues with
aws_auth_backend_roleandaws_auth_backend_role_tags(#439). - Supports providing lists for
bound_claims(#455). - Resolves issue with persistent diffs on
vault_generic_secret(#456).
FEATURES:
- Adds support for using the Vault provider with Terraform 0.12. See the upgrade guide (#446)
BACKWARDS INCOMPATIBILITIES/NOTES:
all: deprecated fields are now removed (#446)auth_backend: thepathfield andidnow no longer have a trailing slash (#446)database_secret_backend_role: the_statementsfields are now a list, not strings (#446)pki_secret_backend_config_urls: the certificate fields are now lists, not strings (#446)pki_secret_backend_role: the certificate fields are now lists, not strings (#446)pki_secret_backend_sign: theca_chainfield is now a list, not a string (#446)rabbitmq_secret_backend_role: thevhostsfield is now avhostblock (#446)
IMPROVEMENTS:
azure_auth_backend_role:client_secretwill now be set in state (#446)
BUG FIXES:
namespace: namespaces will now be removed from state instead of erroring when they're not found (#446)
IMPROVEMENTS:
- Adds support for
role_arnsonaws_secret_backend_role(#407). - Updates the vendored version of Vault to 1.1.2 so features introduced since then can be added (#413).
- Implements
accessorattribute on the Okta auth backend (#420). - Allows the Vault token to be read from the environment (#434).
- Supports
project_idandbound_projectsin the GCP auth backend's roles (#411).
BUG FIXES:
- Fixes a case on
vault_aws_auth_backend_rolewhereresolve_aws_unique_idscould not be updated fromtruetofalsewithout recreating the resource (#382). - Removes default TTL's from the GCP secret backend resource, letting them instead be set by Vault (#426).
FEATURES:
- Adds OIDC support to the JWT auth backend (#398).
- New Resource: Adds a
vault_pki_secret_backend_config_urlsresource (#399).
IMPROVEMENTS:
- Adds support for automatically renewing certificates in the PKI certs backend (#386).
- Adds support for
uri_sansin the PKI secret backend (#373). - Allows a user to delete all policies in the AWS auth role resource (#395).
BUG FIXES:
- Fixes the ability to handle JWT roles that lack policies (#389).
- Allows
vault_ldap_authresources to be imported (#387). - Fixes issue with trailing slashes for the Vault namespaces resource (#391).
- Fixes a bug with namespaces where the path was being overwritten (#396).
FEATURES:
- New Resource: Adds a "Flexible Generic Secret" resource so it can be used to consume Vault APIs that don't yet have a resource (#244).
- New Resource: Adds a token resource (#337).
- New Resource: Adds a GCP secret roleset resource (#312).
- New Resource: Adds a
vault_identity_group_policiesresource (#321).
IMPROVEMENTS:
- For the LDAP auth method, adds support for the
use_token_groupsfield (#367). - Adds the ability to set
max_retrieson the Vault client (#355). - For the Github auth method, adds support for the
accessorfield (#350). - For the generic secrets resource, adds support for a
datafield (#330). - For the JWT auth backend, adds support for a
groups_claim_delimiter_patternon roles (#296). - For the JWT auth backend, adds a
role_typefield (#317). - For the JWT auth backend, adds a
jwt_supported_algsfield (#345).
BUG FIXES:
- Fixes TTL parsing on PKI certificate creation (#314).
- Fixes ability to update the
datafield on database secrets engine connections (#340). - Unmarks
policy_documentandpolicy_arnsfrom being in conflict with each other (#344).
FEATURES:
- Adds compatibility with Vault 1.0 (#292).
- New Resource: Supports the SSH secrets engine role endpoint (#285, #303, and #331).
- New Data Source: Adds a
vault_policy_documentdata source (#283). - New Resource: Adds a namespace resource (#338).
IMPROVEMENTS:
- Adds a guide for how to contribute in the least iterations possible.
- For the TLS Certificates auth method, adds support for the following role fields:
allowed_common_names,allowed_dns_sans,allowed_email_sans,allowed_uri_sans, andallowed_organization_units(#282). - For the GCP auth method, adds support for the following role fields:
add_group_aliases,max_jwt_exp, andallow_gce_inference(#308 and #318). - For the Kubernetes auth method, adds support for
bound_cidrs(#305). - For
vault_identity_group, fixes issue withpoliciesnot being updated properly (#301). - For the AWS secret engine, updates to the current role fields (#323).
BUG FIXES:
- Marks the
token_reviewer_jwtsensitive (#282). - Fixes an issue where boolean parameters were not set when the value was false in the AWS role resource (#302).
- Guards for a nil CA chain in
resource_pki_secret_backend_cert(#310).
FEATURES:
- Adds support for namespaces (#262)
- Adds support for EGP and RGP, a.k.a. Sentinel (#264)
- New Resource: Supports the PKI secrets backend (#158)
- New Resource: Supports identity entities and entity aliases (#247 and #287)
- New Resource: Supports Github auth backend (#255)
- New Resource: Supports Azure auth backend (#275)
- New Resource: Supports JWT auth backend (#272)
BUG FIXES:
- Fixes a panic related to
max_connection_lifetimeparameters in the database secrets backends (#250) - Fixes issue where the
role_nameontoken_auth_backend_rolewould not be updated (#279) - Fixes wrong response data from
gcp_auth_backend_role(#243)
BUG FIXES:
- Fixes an issue with database resources where db statements were overwritten when not provided (#260)
FEATURES:
- New Resource:
vault_gcp_auth_backend(#198) - New Resource:
vault_identity_group(#220) - New Resource:
vault_identity_group_alias(#220)
IMPROVEMENTS:
- Makes
gcp_secret_backendcredentials optional (#239) - Adds more configuration parameters for
auth_backend(#245)
BUG FIXES:
- Fixes issue with
vault_database_secret_backend_connectionalways updating the connection URL (#217)
BUG FIXES:
- Solves issue where the incorrect KV store was selected for older Vault versions as described in #229.
FEATURES:
- New Resource: Supports KV V2 (#156)
- New Resource:
vault_gcp_secret_backend(#212) - New Resource:
vault_aws_auth_backend_roletag_blacklist(#27) - New Resources:
vault_rabbitmq_secret_backendandvault_rabbitmq_secret_backend_role(#216)
IMPROVEMENTS:
- Adds
bound_zones,bound_regions,bound_instance_groups, andbound_labelsfor GCP auth roles via #227 - Exports the LDAP auth backend
accessorvia #195 - Allows for templated database backends via #168
BUG FIXES:
- #222 ensures that booleans on AWS roles default to values matchiing Vault's defaults
FEATURES:
- New Resource:
vault_jwt_auth_backend_role(#188) - New Resources:
vault_kubernetes_auth_backend_configandvault_kubernetes_auth_backend_role(#94) - New Resource:
vault_ssh_secret_backend_ca(#163) - New Feature: Support for the Vault token helper (#136)
IMPROVEMENTS:
- Re-adds changes to
vault_aws_auth_backend_rolefrom #53 - Adds backwards compatibility for the above via #189
- Adds
bound_ec2_instance_idtovault_aws_auth_backend_role(#135) - Adds
mysql_rds,mysql_aurora, andmysql_legacyto the MySQL backend via #87 - Makes audit device path optional via #180
- Adds the field
accessortoresource_auth_backendandresource_mountvia #150 - Marks
bindpassas sensitive in thevault_ldap_auth_backend(#184)
BUG FIXES:
BUG FIXES:
- Reverts breaking changes to
vault_aws_auth_backend_roleintroduced by (#53)
FEATURES:
- New Resource:
vault_consul_secret_backend(#59) - New Resource:
vault_cert_auth_backend_role(#123) - New Resource:
vault_gcp_auth_backend_role(#124) - New Resource:
vault_ldap_auth_backend(#126) - New Resource:
vault_ldap_auth_backend_user(#126) - New Resource:
vault_ldap_auth_backend_group(#126)
FEATURES:
UPDATES:
- Update to vendoring Vault 0.11.1. Introduces some breaking changes for some back ends so update with care.
BUG FIXES:
- Fix panic in
vault_approle_auth_backend_rolewhen used with Vault 0.10 (#103)
FEATURES:
- New Resource:
vault_okta_auth_backend(#8) - New Resource:
vault_okta_auth_backend_group(#8) - New Resource:
vault_okta_auth_backend_user(#8) - New Resource:
vault_approle_auth_backend_login(#34) - New Resource:
vault_approle_auth_backend_role_secret_id(#31) - New Resource:
vault_database_secret_backend_connection(#37)
BUG FIXES:
- Fix bug in
policy_arnparameter ofvault_aws_secret_backend_role(#49) - Fix panic in
vault_generic_secretwhen reading a missing secret (#55) - Fix bug in
vault_aws_secret_backend_rolepreventing use of nested paths (#79) - Fix bug in
vault_aws_auth_backend_rolethat failed to update the role name when it changed (#86)
BACKWARDS INCOMPATIBILITIES / NOTES:
vault_auth_backend's ID has changed from thetypeto thepathof the auth backend. Interpolations referring to the.idof avault_auth_backendshould be updated to use its.typeproperty. (#12)vault_generic_secret'sallow_readfield is deprecated; usedisable_readinstead. Ifdisable_readis set to false or not set, the secret will be read. Ifdisable_readis true andallow_readis false or not set, the secret will not be read. Ifdisable_readis true andallow_readis true, the secret will be read. (#17)
FEATURES:
- New Data Source:
aws_access_credentials(#20) - New Resource:
aws_auth_backend_cert(#21) - New Resource:
aws_auth_backend_client(#19) - New Resource:
aws_auth_backend_login(#28) - New Resource:
aws_auth_backend_role(#24) - New Resource:
aws_auth_backend_sts_role(#22)
IMPROVEMENTS:
vault_auth_backends are now importable. (#12)vault_policys are now importable (#15)vault_mounts are now importable (#16)vault_generic_secrets are now importable (#17)
BUG FIXES:
NOTES:
- Same functionality as that of Terraform 0.9.8. Repacked as part of Provider Splitout