breaking: the dependency vault has been updated to a new major version (5.5.0), which may include breaking changes. #major
#460
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.25.0->5.5.0Release Notes
hashicorp/terraform-provider-vault (vault)
v5.5.0Compare Source
BEHAVIOR CHANGES: With v5.5.0, the default value for
deny_null_bindin thevault_ldap_auth_backendresource has changed fromfalsetotrueto match with the Vault API defaults. Configurations that do not explicitly set
deny_null_bindwill now have it set totrueupon upgrade, andcustomers should verify that this change aligns with their intended LDAP authentication behavior. Furthermore, Customers should also consider
upgrading to Vault Community Edition 1.21.1 and Vault Enterprise 1.21.1, 1.20.6, 1.19.12, and 1.16.28, which no longer allows Vault to perform
unauthenticated or null binds against the LDAP server.
SECURITY:
vault_ldap_auth_backend: Fix incorrectdeny_null_binddefault. Setdeny_null_bindtotrueif not provided in configuration (#2622) (CVE-13357,HCSEC-2025-33)FEATURES:
alias_metadatafield in auth resources (#2547)not_before_durationfield invault_pki_secret_backend_root_cert(#2664)IMPROVEMENTS:
golang.org/x/cryptov0.41.0 -> v0.45.0golang.org/x/netv0.43.0 -> v0.47.0golang.org/x/modv0.26.0 -> v0.29.0golang.org/x/syncv0.16.0 -> v0.18.0golang.org/x/sysv0.35.0 -> v0.38.0golang.org/x/textv0.28.0 -> v0.31.0golang.org/x/toolsv0.35.0 -> v0.38.0v5.4.0Compare Source
BEHAVIOR CHANGES: Please refer to the upgrade topics
in the guide for details on all behavior changes.
FEATURES:
vault_terraform_cloud_secret_roleto support multi-team tokens, by @drewmullen (#2498)tuneinvault_saml_auth_backendresource (#2566)tuneinvault_ldap_auth_backendandvault_okta_auth_backendresources (#2602)allowed_sts_header_valuesparameter invault_aws_auth_backend_clientresource to specify additional headers allowed in STS requestsvault_gcp_secret_backendto support ttl and max_ttl, by @vijayavelsekar (#2627)request_timeout,dereference_aliases,enable_samaccountname_loginandanonymous_group_searchparameters invault_ldap_auth_backendresource.(#2634)max_retriesparameter invault_aws_secret_backendresource. (#2623)iam_alias,iam_metadata,gce_aliasandgce_metadatafields invault_gcp_auth_backendresource (#2636)role_idfield invault_gcp_auth_backend_roleresource (#2636)max_retries,retry_delay,max_retry_delay) tovault_azure_auth_backend_configresource for Azure API request resilience (#2629)vault_spiffe_auth_backend_configandvault_spiffe_auth_backend_role(#2620)mfa_serial_numberparameter invault_aws_secret_backend_roleresource. (#2637)persist_appparameters invault_azure_secret_backend_roleresource.(#2642)
BUGS:
vault_pki_secret_backend_crl_configresource to allow disabling flags previously set to true (#2615)vault_jwt_auth_backendresource (#2560)vault_github_auth_backendandvault_auth_backendresources (#2565)vault_saml_auth_backendresource (#2566)vault_gcp_auth_backendandvault_oci_auth_backendresources (#2596)v5.3.0Compare Source
FEATURES:
credential_typefield in thevault_ldap_secret_backendresource (#2548)IMPROVEMENTS:
BUGS:
azure_secret_backend_roleto prevent persistent diff for null value onmax_ttlandexplicit_max_ttlargument (#2581)v5.2.1Compare Source
BUGS:
auth_login_gcpfield constraint on fieldcredentialsservice_accountauth_login_azurefield constraint on fieldvmss_nametenant_idclient_idscopeauth_login_kerberosfield constraint on fieldsusernameservicerealmkrb5conf_pathkeytab_pathdisable_fast_negotiationremove_instance_nameauth_login_userpassfield constraint on fieldpassword_fileauth_loginfield constraint on fielduse_root_namespacev5.2.0Compare Source
FEATURES:
jwks_pairsinvault_jwt_auth_backendresource. Requires Vault 1.16+ (#2523)root_password_ttlinvault_azure_secret_backendresource. Requires Vault 1.15+ (#2529)vault_oci_auth_backendandvault_oci_auth_backend_roleto manage OCI auth backend and roles. (#1761)log_levelinvault_pki_secret_backend_config_scepresource. Requires Vault 1.20.1+ (#2525)IMPROVEMENTS:
golang.org/x/oauth2v0.24.0 -> v0.30.0github.com/cloudflare/circlv1.3.7 -> v1.6.1github.com/go-jose/go-jose/v3v3.0.3 -> v3.0.4github.com/go-jose/go-jose/v4v4.0.4 -> v4.1.2github.com/golang-jwt/jwt/v5v5.2.2 -> v5.3.0cloud.google.com/go/iamv1.2.2 -> v1.5.2cloud.google.com/go/compute/metadatav0.6.0 -> v0.8.0github.com/Azure/azure-sdk-for-go/sdk/azcorev1.11.1 -> v1.18.2github.com/aws/aws-sdk-gov1.55.6 -> v1.55.8github.com/go-sql-driver/mysqlv1.8.1 -> v1.9.3github.com/hashicorp/consul/apiv1.27.0 -> v1.32.1github.com/hashicorp/terraform-plugin-frameworkv1.14.1 -> 1.15.1github.com/hashicorp/terraform-plugin-framework-validatorsv0.17.0 -> v0.18.0hashicorp/ghaction-terraform-provider-releasev4.0.1 -> v5.0.0BUGS:
vault_gcp_secret_backendresource. (#2549)VAULT_NAMESPACEwas not being honored, causing child namespaces to be created in the root namespace instead (#2540)v5.1.0Compare Source
FEATURES:
Add support for key_usage to
vault_pki_secret_backend_root_sign_intermediate(#2421)Add
private_key_woandprivate_key_wo_versionfields to Snowflake DB secrets engine config (#2508)Add support for
group_byandsecondary_rateon resourcevault_quota_rate_limit. Requires Vault Enterprise 1.20.0+ (#2476)Add support for Transit CMAC endpoint (#2488)
Add new resource
vault_scep_auth_backend_roleto manage roles in a SCEP auth backend. #2479.Add new datasource and resource
vault_pki_secret_backend_config_scepfor PKI SCEP configuration. #2487.v5.0.0Compare Source
Important:
5.Xmultiplexes the Vault provider to use the Terraform Plugin Framework,upgrades to Terraform
1.11.x, and adds support for Ephemeral Resources and Write-Only attributes.Please refer to the
Terraform Vault Provider 5.0.0 Upgrade Guide for specific
details around the changes.
VERSION COMPATIBILITY:
5.Xis officially supported and tested against Vault server versions >=1.15.x.5.Xsupports Terraform versions >=1.11.xin order to support ephemeral resources and write-only attributes.BREAKING CHANGES:
Please refer to the upgrade topics
in the guide for details on all breaking changes.
FEATURES:
vault_kv_secret_v2vault_database_secretdata_json_wo(along withdata_json_wo_version) to resourcevault_kv_secret_v2credentials_wo, (along withcredentials_wo_version) to resourcevault_gcp_secret_backendpassword_wo, (along withpassword_wo_versionto resource)vault_database_secret_backend_connectionBUGS:
vault_policy_documentdata source regression to allow emptycapabilities(#2466)v4.8.0Compare Source
FEATURES:
recursivesearch indata_vault_namespaces#2408subscribe_event_typesindata_source_policy_document#2445explicit_max_ttlinvault_azure_secret_backend_roleresources. Requires Vault 1.18+ (#2438).BUGS:
vault_azure_access_credentialsdata source caused by Azure RBAC propagation delays usingazure_groups#2437v4.7.0Compare Source
FEATURES:
vault_pki_secret_backend_root_certandvault_pki_secret_backend_root_sign_intermediateto support the new fields for the name constraints extension. Requires Vault 1.19+ (#2396).vault_pki_secret_backend_issuerresource with the new issuer configuration fields to control certificate verification. Requires Vault Enterprise 1.19+ (#2400).revoke_with_keyinvault_pki_secret_backend_cert(#2242)vault_pki_secret_backend_role,vault_pki_secret_backend_root_cert,vault_pki_secret_backend_root_sign_intermediateandvault_pki_secret_backend_intermediate_cert_request([#2401])(#2401)vault_pki_secret_backend_intermediate_cert_request([#2404])(#2404)skip_import_rotationinvault_database_secret_backend_static_role. Requires Vault Enterprise 1.18.5+ (#2386).not_afterinvault_pki_secret_backend_cert,vault_pki_secret_backend_role,vault_pki_secret_backend_root_cert,vault_pki_secret_backend_root_sign_intermediate, andvault_pki_secret_backend_sign(#2385).vault_pki_secret_backend_config_acmeto support themax_ttlfield. #2411vault_ssh_secret_backend_sign. (#2409)disabled_validationsinvault_pki_secret_backend_config_cmpv2#2412credential_typeandcredential_configtodatabase_secret_backend_static_roleto support features like rsa keys for Snowflake DB engines with static roles #2384vault_pki_secret_backend_root_sign_intermediate:not_before_duration,skidanduse_pss#2417use_pss,no_store_metadata, andserial_number_sourcetovault_pki_secret_backend_role#2420signandverifyendpoints (#2418)vault_pki_secret_backend_cert_metadataand support forcert_metadatainvault_pki_secret_backend_certandvault_pki_secret_backend_sign#2422max_crl_entriesinvault_pki_secret_backend_crl_config#2423vault_pki_secret_backend_config_auto_tidyto set PKI automatic tidy configuration #1934BUGS:
IMPROVEMENTS:
v4.6.0Compare Source
FEATURES:
vault_database_secret_backend_connectionto supportpassword_authenticationfor PostgreSQL, allowing to encrypt password before being passed to PostgreSQL (#2371)external_idfield for thevault_aws_auth_backend_sts_roleresource (#2370)vault_pki_secret_backend_config_acmeresource. Requires Vault 1.14+ (#2157).vault_pki_secret_backend_roleto support thecn_validationsrole field (#1820).vault_pki_secret_backend_acme_eabto manage PKI ACME external account binding tokens. Requires Vault 1.14+. (#2367)vault_pki_secret_backend_config_cmpv2. Requires Vault 1.18+. Available only for Vault Enterprise (#2330)IMPROVEMENTS:
subscribepolicy capability forvault_policy_documentdata source (#2293)v4.5.0Compare Source
FEATURES:
vault_database_secret_backend_connectionto support inline TLS config for PostgreSQL (#2339)vault_database_secret_backend_connectionto support skip_verification config for Cassandra (#2346)vault_approle_auth_backend_role_secret_idto supportnum_usesandttlfields (#2345)allow_empty_principalsfield for thevault_ssh_secret_backend_roleresource (#2354)vault_gcp_secret_impersonated_accountto support settingttl(#2318)connection_timeoutfield for thevault_ldap_auth_backendresource (#2358)use_annotations_as_alias_metadatafield for thevault_kubernetes_auth_backend_configresource (#2226)BUGS:
v4.4.0Compare Source
FEATURES:
vault_aws_secret_backend_roleto support settingsession_tagsandexternal_id(#2290)BUGS:
vault_ssh_secret_backend_cawhere a schema change forced the resource to be replaced (#2308)v4.3.0Compare Source
FEATURES:
iam_tagsinvault_aws_secret_backend_role(#2231).inheritableonvault_quota_rate_limitandvault_quota_lease_count. Requires Vault 1.15+.: (#2133).vault_gcp_secret_backend. Requires Vault 1.17+. Available only for Vault Enterprise (#2249).vault_azure_secret_backend. Requires Vault 1.17+. Available only for Vault Enterprise (#2250)vault_aws_auth_backend_client. Requires Vault 1.17+. Available only for Vault Enterprise (#2243).vault_gcp_auth_backend(#2256)vault_azure_auth_backend_config. Requires Vault 1.17+. Available only for Vault Enterprise (#2254).vault_pki_secret_backend_config_est. Requires Vault 1.16+. Available only for Vault Enterprise (#2246)vault_okta_auth_backendresource: (#2210)max_retriesinvault_aws_auth_backend_client: (#2270)vault_pluginandvault_plugin_pinned_version: (#2159)key_typeandkey_bitstovault_ssh_secret_backend_ca: (#1454)IMPROVEMENTS:
vault_jwt_auth_backend_roleresource: (#2232)BUGS:
github.com/hashicorp/vaultpackage: (#2251)custom_tagsandsecret_name_templatefields tovault_secrets_sync_azure_destinationresource (#2247)max_path_lengthinvault_pki_secret_backend_root_certandvault_pki_secret_backend_root_sign_intermediateresources (#2253)v4.2.0Compare Source
FEATURES:
granularityto Secrets Sync destination resources. Requires Vault 1.16+ Enterprise. (#2202)allowed_kubernetes_namespace_selectorinvault_kubernetes_secret_backend_role(#2180).vault_namespace. Requires Vault Enterprise: (#2208).vault_namespaces. Requires Vault Enterprise: (#2212).IMPROVEMENTS:
BUGS:
vault_approle_auth_backend_role_secret_idregression to handle 404 errors (#2204)vault_kv_secretandvault_kv_secret_v2failure to update secret data modified outside terraform (#2207)vault_kv_secret_v2failing on imported resource when data_json should be ignored (#2207)v4.1.0Compare Source
CHANGES TO VAULT POLICY REQUIREMENTS:
The v4.0.0 release required read permissions at
sys/auth/:pathwhich was asudo endpoint. The v4.1.0 release changed that to instead require permissions
at the
sys/mounts/auth/:pathlevel and sudo is no longer required. Pleaserefer to the details in the Terraform Vault Provider 4.0.0 Upgrade Guide.
FEATURES:
vault_config_ui_custom_message. Requires Vault 1.16+ Enterprise: (#2154).IMPROVEMENTS:
BUGS:
vault_azure_access_credentialsto default to Azure Public Cloud (#2190)v4.0.0Compare Source
Important: This release requires read policies to be set at the path level for mount metadata.
For example, instead of permissions at
sys/authyou must set permissions atthe
sys/auth/:pathlevel. Please refer to the details in theTerraform Vault Provider 4.0.0 Upgrade Guide.
FEATURES:
vault_pki_secret_backend_config_clusterresource. Requires Vault 1.13+ (#1949).enable_templatinginvault_pki_secret_backend_config_urls(#2147).skip_import_rotationandskip_static_role_import_rotationinldap_secret_backend_static_roleandldap_secret_backendrespectively. Requires Vault 1.16+ (#2128).vault_pluginandvault_plugin_pinned_versionresources for managing external plugins (#2159)IMPROVEMENTS:
versionin returned values forvault_kv_secret_v2data source: (#2095)BUGS:
vault_ldap_secret_backend_static_role,vault_ldap_secret_backend_library_set, andvault_ldap_secret_backend_static_role(#2156).Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.