FEATURES:
- Adds support for namespaces (#262)
- Adds support for EGP and RGP, a.k.a. Sentinel (#264)
- New Resource: Supports the PKI secrets backend (#158)
- New Resource: Supports identity entities and entity aliases (#247 and #287)
- New Resource: Supports Github auth backend (#255)
- New Resource: Supports Azure auth backend (#275)
- New Resource: Supports JWT auth backend (#272)
BUG FIXES:
- Fixes a panic related to
max_connection_lifetimeparameters in the database secrets backends (#250) - Fixes issue where the
role_nameontoken_auth_backend_rolewould not be updated (#279) - Fixes wrong response data from
gcp_auth_backend_role(#243)
BUG FIXES:
- Fixes an issue with database resources where db statements were overwritten when not provided (#260)
FEATURES:
- New Resource:
vault_gcp_auth_backend(#198) - New Resource:
vault_identity_group(#220) - New Resource:
vault_identity_group_alias(#220)
IMPROVEMENTS:
- Makes
gcp_secret_backendcredentials optional (#239) - Adds more configuration parameters for
auth_backend(#245)
BUG FIXES:
- Fixes issue with
vault_database_secret_backend_connectionalways updating the connection URL (#217)
BUG FIXES:
- Solves issue where the incorrect KV store was selected for older Vault versions as described in #229.
FEATURES:
- New Resource: Supports KV V2 (#156)
- New Resource:
vault_gcp_secret_backend(#212) - New Resource:
vault_aws_auth_backend_roletag_blacklist(#27) - New Resources:
vault_rabbitmq_secret_backendandvault_rabbitmq_secret_backend_role(#216)
IMPROVEMENTS:
- Adds
bound_zones,bound_regions,bound_instance_groups, andbound_labelsfor GCP auth roles via #227 - Exports the LDAP auth backend
accessorvia #195 - Allows for templated database backends via #168
BUG FIXES:
- #222 ensures that booleans on AWS roles default to values matchiing Vault's defaults
FEATURES:
- New Resource:
vault_jwt_auth_backend_role(#188) - New Resources:
vault_kubernetes_auth_backend_configandvault_kubernetes_auth_backend_role(#94) - New Resource:
vault_ssh_secret_backend_ca(#163) - New Feature: Support for the Vault token helper (#136)
IMPROVEMENTS:
- Re-adds changes to
vault_aws_auth_backend_rolefrom #53 - Adds backwards compatibility for the above via #189
- Adds
bound_ec2_instance_idtovault_aws_auth_backend_role(#135) - Adds
mysql_rds,mysql_aurora, andmysql_legacyto the MySQL backend via #87 - Makes audit device path optional via #180
- Adds the field
accessortoresource_auth_backendandresource_mountvia #150 - Marks
bindpassas sensitive in thevault_ldap_auth_backend(#184)
BUG FIXES:
BUG FIXES:
- Reverts breaking changes to
vault_aws_auth_backend_roleintroduced by (#53)
FEATURES:
- New Resource:
vault_consul_secret_backend(#59) - New Resource:
vault_cert_auth_backend_role(#123) - New Resource:
vault_gcp_auth_backend_role(#124) - New Resource:
vault_ldap_auth_backend(#126) - New Resource:
vault_ldap_auth_backend_user(#126) - New Resource:
vault_ldap_auth_backend_group(#126)
FEATURES:
UPDATES:
- Update to vendoring Vault 0.11.1. Introduces some breaking changes for some back ends so update with care.
BUG FIXES:
- Fix panic in
vault_approle_auth_backend_rolewhen used with Vault 0.10 (#103)
FEATURES:
- New Resource:
vault_okta_auth_backend(#8) - New Resource:
vault_okta_auth_backend_group(#8) - New Resource:
vault_okta_auth_backend_user(#8) - New Resource:
vault_approle_auth_backend_login(#34) - New Resource:
vault_approle_auth_backend_role_secret_id(#31) - New Resource:
vault_database_secret_backend_connection(#37)
BUG FIXES:
- Fix bug in
policy_arnparameter ofvault_aws_secret_backend_role(#49) - Fix panic in
vault_generic_secretwhen reading a missing secret (#55) - Fix bug in
vault_aws_secret_backend_rolepreventing use of nested paths (#79) - Fix bug in
vault_aws_auth_backend_rolethat failed to update the role name when it changed (#86)
BACKWARDS INCOMPATIBILITIES / NOTES:
vault_auth_backend's ID has changed from thetypeto thepathof the auth backend. Interpolations referring to the.idof avault_auth_backendshould be updated to use its.typeproperty. (#12)vault_generic_secret'sallow_readfield is deprecated; usedisable_readinstead. Ifdisable_readis set to false or not set, the secret will be read. Ifdisable_readis true andallow_readis false or not set, the secret will not be read. Ifdisable_readis true andallow_readis true, the secret will be read. (#17)
FEATURES:
- New Data Source:
aws_access_credentials(#20) - New Resource:
aws_auth_backend_cert(#21) - New Resource:
aws_auth_backend_client(#19) - New Resource:
aws_auth_backend_login(#28) - New Resource:
aws_auth_backend_role(#24) - New Resource:
aws_auth_backend_sts_role(#22)
IMPROVEMENTS:
vault_auth_backends are now importable. (#12)vault_policys are now importable (#15)vault_mounts are now importable (#16)vault_generic_secrets are now importable (#17)
BUG FIXES:
NOTES:
- Same functionality as that of Terraform 0.9.8. Repacked as part of Provider Splitout