Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): bump the terraform group in /test with 1 update #122

Closed

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 1, 2023

Bumps the terraform group in /test with 1 update: hashicorp/vault.

Release notes

Sourced from hashicorp/vault's releases.

v3.21.0

3.21.0 (Oct 9, 2023)

FEATURES:

  • Add GCP CloudSQL support to Postgres, MySQL DB engines: (#2012)
  • Add support for DB Adv TTL Mgmt: (#2011)
  • Add support for setting not_before_duration argument on vault_ssh_secret_backend_role: (#2019)
  • Add support for hmac key type and key_size to vault_transit_secret_backend_key: (#2034)
  • Add support for roles to both rate limit and lease count quotas: (#1994)
  • Add allowed_email_sans field to write and update functions of vault_cert_auth_backend_role: (#1140)
  • Add support for local parameter in aws secret engine: (#2013)

BUGS:

  • Fix duplicate timestamp and incorrect level messages: (#2031)
  • Fix panic when setting key_usage to an array of empty string and enable it to unset the key usage constraints: (#2036)
  • Add state migrator for external_member_group_ids in Identity Group (#2043)
  • Fix drift detection for the kv-v2 secrets resource when disable_read is enabled: (#2039)
  • Add state migrator in secrets/auth backends for disable_remount parameter (#2037)
  • Fix failure when auth_login is specified and vault token is picked up from the runtime/execution environment: (#2029)
  • Remove logging of password key: (#2044)

IMPROVEMENTS:

  • Oracle DB engine enablement on HCP Vault: (#2006)
  • Ensure sensitive values are masked in vault_approle_auth_backend_login plan output (#2008)
  • Updated dependencies: (#2038)
    • cloud.google.com/go/compute v1.10.0 removed
    • cloud.google.com/go/compute/metadata v0.2.3 added
    • cloud.google.com/go/iam v0.3.0 -> v1.1.2
    • github.com/Azure/go-autorest/autorest v0.11.24 -> v0.11.29
    • github.com/cenkalti/backoff/v4 v4.1.2 -> v4.2.1
    • github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f -> v0.0.0-20230601102743-20bbbf26f4d8
    • github.com/denisenkom/go-mssqldb v0.12.0 -> v0.12.3
    • github.com/go-sql-driver/mysql v1.6.0 -> v1.7.1
    • github.com/google/uuid v1.3.0 -> v1.3.1
    • github.com/gosimple/slug v1.11.0 -> v1.13.1
    • github.com/hashicorp/go-cty v1.4.1-0.20200414143053-d3edf31b6320 -> v1.4.1-0.20200723130312-85980079f637
    • github.com/hashicorp/go-retryablehttp v0.7.1 -> v0.7.4
    • github.com/hashicorp/terraform-plugin-sdk/v2 v2.16.0 -> v2.29.0
    • github.com/hashicorp/vault-plugin-auth-jwt v0.13.2-0.20221012184020-28cc68ee722b -> v0.17.0
    • github.com/hashicorp/vault-plugin-auth-kerberos v0.8.0 -> v0.10.1
    • github.com/hashicorp/vault-plugin-auth-oci v0.13.0-pre -> v0.14.2
    • github.com/hashicorp/vault/api v1.9.3-0.20230628215639-3ca33976762c -> v1.10.0
    • github.com/hashicorp/vault/sdk v0.6.0 -> v0.10.0
    • github.com/jcmturner/gokrb5/v8 v8.4.2 -> v8.4.4
    • golang.org/x/crypto v0.6.0 -> v0.14.0
    • golang.org/x/net v0.7.0 -> v0.15.0
    • golang.org/x/oauth2 v0.0.0-20221006150949-b44042a4b9c1 -> v0.12.0
    • google.golang.org/api v0.98.0 -> v0.144.0
    • google.golang.org/genproto v0.0.0-20221010155953-15ba04fc1c0e -> v0.0.0-20231002182017-d307bd883b97
    • k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9 -> v0.0.0-20230726121419-3b25d923346b
Changelog

Sourced from hashicorp/vault's changelog.

3.21.0 (Oct 9, 2023)

FEATURES:

  • Add GCP CloudSQL support to Postgres, MySQL DB engines: (#2012)
  • Add support for DB Adv TTL Mgmt: (#2011)
  • Add support for setting not_before_duration argument on vault_ssh_secret_backend_role: (#2019)
  • Add support for hmac key type and key_size to vault_transit_secret_backend_key: (#2034)
  • Add support for roles to both rate limit and lease count quotas: (#1994)
  • Add allowed_email_sans field to write and update functions of vault_cert_auth_backend_role: (#1140)
  • Add support for local parameter in aws secret engine: (#2013)

BUGS:

  • Fix duplicate timestamp and incorrect level messages: (#2031)
  • Fix panic when setting key_usage to an array of empty string and enable it to unset the key usage constraints: (#2036)
  • Add state migrator for external_member_group_ids in Identity Group (#2043)
  • Fix drift detection for the kv-v2 secrets resource when disable_read is enabled: (#2039)
  • Add state migrator in secrets/auth backends for disable_remount parameter (#2037)
  • Fix failure when auth_login is specified and vault token is picked up from the runtime/execution environment: (#2029)
  • Remove logging of password key: (#2044)

IMPROVEMENTS:

  • Oracle DB engine enablement on HCP Vault: (#2006)
  • Ensure sensitive values are masked in vault_approle_auth_backend_login plan output (#2008)
  • Updated dependencies: (#2038)
    • cloud.google.com/go/compute v1.10.0 removed
    • cloud.google.com/go/compute/metadata v0.2.3 added
    • cloud.google.com/go/iam v0.3.0 -> v1.1.2
    • github.com/Azure/go-autorest/autorest v0.11.24 -> v0.11.29
    • github.com/cenkalti/backoff/v4 v4.1.2 -> v4.2.1
    • github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f -> v0.0.0-20230601102743-20bbbf26f4d8
    • github.com/denisenkom/go-mssqldb v0.12.0 -> v0.12.3
    • github.com/go-sql-driver/mysql v1.6.0 -> v1.7.1
    • github.com/google/uuid v1.3.0 -> v1.3.1
    • github.com/gosimple/slug v1.11.0 -> v1.13.1
    • github.com/hashicorp/go-cty v1.4.1-0.20200414143053-d3edf31b6320 -> v1.4.1-0.20200723130312-85980079f637
    • github.com/hashicorp/go-retryablehttp v0.7.1 -> v0.7.4
    • github.com/hashicorp/terraform-plugin-sdk/v2 v2.16.0 -> v2.29.0
    • github.com/hashicorp/vault-plugin-auth-jwt v0.13.2-0.20221012184020-28cc68ee722b -> v0.17.0
    • github.com/hashicorp/vault-plugin-auth-kerberos v0.8.0 -> v0.10.1
    • github.com/hashicorp/vault-plugin-auth-oci v0.13.0-pre -> v0.14.2
    • github.com/hashicorp/vault/api v1.9.3-0.20230628215639-3ca33976762c -> v1.10.0
    • github.com/hashicorp/vault/sdk v0.6.0 -> v0.10.0
    • github.com/jcmturner/gokrb5/v8 v8.4.2 -> v8.4.4
    • golang.org/x/crypto v0.6.0 -> v0.14.0
    • golang.org/x/net v0.7.0 -> v0.15.0
    • golang.org/x/oauth2 v0.0.0-20221006150949-b44042a4b9c1 -> v0.12.0
    • google.golang.org/api v0.98.0 -> v0.144.0
    • google.golang.org/genproto v0.0.0-20221010155953-15ba04fc1c0e -> v0.0.0-20231002182017-d307bd883b97
    • k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9 -> v0.0.0-20230726121419-3b25d923346b
Commits
  • b98c875 Downgrade vault-plugin-auth-jwt dependency to v0.17.0 (#2046)
  • 58c01d8 Update changeglog for v3.21.0 release (#2045)
  • 56555e6 remove logging of password key (#2044)
  • d325639 Add state migrator in secrets/auth mounts for disable_remount parameter (#2...
  • f8375be secret/kvv2: fix drift detection when disable_read is enabled (#2039)
  • 9283df7 Add state migrator for external_member_group_ids in Identity Group (#2043)
  • 82ec575 secret/transit: use ProviderFactories in test (#2041)
  • 63db5bf chore: update dependencies (#2038)
  • b672cb4 secret/pki: fix key_usage panic and unset function (#2036)
  • 95a3230 Add support for HMAC type to vault_transit_secret_backend_key (#2034)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the terraform group in /test with 1 update: [hashicorp/vault](https://github.com/hashicorp/terraform-provider-vault).

- [Release notes](https://github.com/hashicorp/terraform-provider-vault/releases)
- [Changelog](https://github.com/hashicorp/terraform-provider-vault/blob/main/CHANGELOG.md)
- [Commits](hashicorp/terraform-provider-vault@v3.20.1...v3.21.0)

---
updated-dependencies:
- dependency-name: hashicorp/vault
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: terraform
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot requested a review from artis3n as a code owner November 1, 2023 18:14
@dependabot dependabot bot added dependencies Pull requests that update a dependency file terraform Pull requests that update Terraform code labels Nov 1, 2023
Copy link
Contributor Author

dependabot bot commented on behalf of github Nov 8, 2023

Superseded by #123.

@dependabot dependabot bot closed this Nov 8, 2023
@dependabot dependabot bot deleted the dependabot/terraform/test/terraform-5e41daf409 branch November 8, 2023 20:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file terraform Pull requests that update Terraform code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants