Commit graph

2333 commits

Author SHA1 Message Date
OpenTofu Core Development Team
e4c7ce0742 Apply GitHub workflow changes
Some checks failed
build / build-pre (push) Has been cancelled
build / Go darwin 386 build (push) Has been cancelled
build / Go freebsd 386 build (push) Has been cancelled
build / Go linux 386 build (push) Has been cancelled
build / Go windows 386 build (push) Has been cancelled
build / Go darwin amd64 build (push) Has been cancelled
build / Go freebsd amd64 build (push) Has been cancelled
build / Go linux amd64 build (push) Has been cancelled
build / Go windows amd64 build (push) Has been cancelled
build / Go freebsd arm build (push) Has been cancelled
build / Go linux arm build (push) Has been cancelled
build / vault_image:vault-enterprise:1.19.12-ent tf_version:1.12.2 (push) Has been cancelled
build / vault_image:vault-enterprise:1.19.12-ent tf_version:latest (push) Has been cancelled
build / vault_image:vault-enterprise:1.20.5-ent tf_version:1.11.4 (push) Has been cancelled
build / vault_image:vault-enterprise:1.20.5-ent tf_version:1.12.2 (push) Has been cancelled
build / vault_image:vault-enterprise:1.20.5-ent tf_version:latest (push) Has been cancelled
build / vault_image:vault-enterprise:1.21.1-ent tf_version:1.11.4 (push) Has been cancelled
build / vault_image:vault-enterprise:1.21.1-ent tf_version:1.12.2 (push) Has been cancelled
build / vault_image:vault-enterprise:1.21.1-ent tf_version:latest (push) Has been cancelled
build / vault_image:vault:latest tf_version:1.11.4 (push) Has been cancelled
build / vault_image:vault:latest tf_version:1.12.2 (push) Has been cancelled
build / vault_image:vault:latest tf_version:latest (push) Has been cancelled
build / generate-metadata-file (push) Has been cancelled
build / Go darwin arm64 build (push) Has been cancelled
build / Go linux arm64 build (push) Has been cancelled
build / vault_image:vault-enterprise:1.16.27-ent tf_version:1.11.4 (push) Has been cancelled
build / vault_image:vault-enterprise:1.16.27-ent tf_version:1.12.2 (push) Has been cancelled
build / vault_image:vault-enterprise:1.16.27-ent tf_version:latest (push) Has been cancelled
build / upload-terraform-registry-manifest-artifact (push) Has been cancelled
build / build-done (push) Has been cancelled
2026-01-10 00:40:58 +00:00
chpag
0cea5fa544
VAULT-27015: Fix Issue with plugin_name not used in vault_database_secret_backend_connection (#2705)
* Fix db getpluginname (#2704)

* Update resource_database_secret_backend_connection.go

Modify getDatabaseAPIDataForEngine to use unifiedSchema and then been able to getPluginName:
- with the prefix (UnifiedSchema = true)
- without the prefix (UnifiedSchema = false)

* modified:   vault/resource_database_secret_backend_connection_test.go

* modified:   vault/resource_database_secret_backend_connection_test.go

* modified:   vault/resource_database_secret_backend_connection_test.go

* modified:   vault/resource_database_secret_backend_connection_test.go

* Update CHANGELOG.md
2026-01-09 22:30:44 +00:00
drewmullen
b187d58a04
docs: update example to use wo attribute for vault_kv_secret_v2 (#2731)
* update example to use wo attribute and include in docs

* changelog: use wo for vault kvv2 secret
2026-01-07 20:57:52 +00:00
drewmullen
19053544a3
fix heredoc and last name in example (#2728)
* fix heredoc and last name in example

* fix heredoc and last name in example
2026-01-07 10:25:45 -05:00
harshit-nema
5a4538d719
Feature parity Secret_Sync - Added missing configuration parameters for Github destination (#2697)
* Added configuration parameters for Github destination

* CHANGELOG.md updated with PR request

* Example usage snippet and description updated for the added configuration and networking  paramameters

* Formatting correction

* typeSet implemented for ipv4address, ipv6address and allowed_port paramaters. Review comments accomodated

* SyncDestinationCreateUpdateWithOptions added to mitigate code duplication due to typeSet implementation for ipv4address, ipv6address, allowed_port parameters
2025-12-19 10:57:27 +05:30
Balaji
5f7ef99373
auth/aws: Enhance AWS authentication with role assumption and custom endpoints. (#2679)
* auth/aws: Enhance AWS authentication with role assumption and custom endpoints.

- Refactor `getLoginData` to support role assumption using STS.
- Introduce custom endpoint resolvers for STS and IAM services.
- Update `getCredentialsConfig` to utilize new options for role ARN and session name.
- Implement `generateLoginData` to create presigned requests for AWS API calls.
- Add unit tests for role assumption logic, session token handling, and custom endpoint configuration.
- Migrate to `awsutil/v2` for improved credential management.

* auth/aws: Update CHANGELOG.

* Refactor AWS credential retrieval in generateLoginData for clear error handling.
2025-12-18 09:33:44 +05:30
siyer-corp
40b17648bc
Add support for networking, encryption and replication params in GCP secret-sync destination (#2699) 2025-12-17 11:07:02 +05:30
Shilpa M
22b7c122e0
Added missing network configuration parameters for Azure Key Vault secrets sync destination (#2702)
VAULT-41065_TFVP_Add_missing_Networking_param_Azure_destination_Secret_sync
2025-12-16 22:08:05 +05:30
Balaji
dd1057f0df
secretssync/AWS: Add networking configuration feature for AWS Secrets Sync Destination. (#2698)
* secretssync/AWS: Add networking configuration feature for AWS Secrets Sync Destination.

* secretssync/aws: Update CHANGELOG.

* Update resource descriptions and test pre-check utility.

* refactor: streamline create/update logic for AWS Secrets Sync.

* Add Invalid networking config tests.
2025-12-16 12:32:02 +05:30
Vijayavel Sekar
beb244356e
VAULT-41068 TypeList to TypeSet conversion of network fields (#2701)
* VAULT-41068 TypeList to TypeSet conversion of network fields

* VAULT-41068 Skip func impementation for negative test cases

* VAULT-41068 Common code refactoring

* VAULT-41068 Removed code duplication
2025-12-12 21:19:12 +05:30
aahel
700790cf68
added support for tls_ca,tls_certificate_key and write_concern fields in mongodb database plugin (#2678)
* added support in mongodb database plugin for for tls_ca,tls_certificate_key,write_concern

* added changelog and docs

* read all fields from vault api response

* add normalization and validation for json field write_concern
2025-12-08 21:32:50 +05:30
Shilpa M
a67385c11c
TFVP - Added support for tls_server_name , local_datacenter, socket_keep_alive,consistency and username_template missing configuration parameters for Cassandra database secret engine (#2677)
VAULT-41045_TFVP_Cassandra_Changes
2025-12-06 02:05:17 +05:30
Vijayavel Sekar
9e446b273d
Add networking configuration parameters for vault_secrets_sync_vercel_destination (#2681)
* feat(VAULT-41068): add networking configuration parameters for Vercel destination

* VAULT-41068 Change log update
2025-12-05 16:52:52 +00:00
Vijayavel Sekar
926c4ae67c
Adds username_template support to hanadb connection and mount resources (#2671)
VAULT-41060 Added username_template support to hanadb connection and mount resources
2025-12-05 09:42:07 -06:00
harshit-nema
0aa107a974
username_template configuration parameter added in Database Secret Engine (MongoDB Atlas). (#2674)
* Code, Doc, tests updated to add username_template field in MongoDB Atlas Database Secret Engine.

* CHANGELOG.md file updated with PR link
2025-12-05 12:52:39 +05:30
Vijayavel Sekar
85550e475b
feat(VAULT-40727): Adding change log entry (#2692) 2025-12-05 05:26:30 +00:00
Ben Ash
bcb1be4983
Updates for v5.6.0 release (#2690)
* Updates for v5.6.0 release

* Drop duplicated FieldTokenTTL

* Bump Go version

Bump release version
2025-12-04 22:31:52 +00:00
Tejashwini Ingalagi
3a8f12da30
Added fields related to namespace used to create a role in kubernetes auth method (#2644)
---------

Co-authored-by: Frédéric Thomas <frederic.thomas@lenstra.fr>
Co-authored-by: aahel <aahel.guha@hashicorp.com>
2025-12-04 21:10:51 +00:00
dependabot[bot]
ee6cf0ee1a
build(deps): bump the gomod-backward-compatible group across 1 directory with 18 updates (#2673)
Bumps the gomod-backward-compatible group with 14 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [cloud.google.com/go/compute/metadata](https://github.com/googleapis/google-cloud-go) | `0.8.0` | `0.9.0` |
| [cloud.google.com/go/iam](https://github.com/googleapis/google-cloud-go) | `1.5.2` | `1.5.3` |
| [github.com/Azure/azure-sdk-for-go/sdk/azcore](https://github.com/Azure/azure-sdk-for-go) | `1.19.0` | `1.20.0` |
| [github.com/Azure/azure-sdk-for-go/sdk/azidentity](https://github.com/Azure/azure-sdk-for-go) | `1.11.0` | `1.13.1` |
| [github.com/hashicorp/consul/api](https://github.com/hashicorp/consul) | `1.32.1` | `1.33.0` |
| [github.com/hashicorp/go-version](https://github.com/hashicorp/go-version) | `1.7.0` | `1.8.0` |
| [github.com/hashicorp/terraform-plugin-framework](https://github.com/hashicorp/terraform-plugin-framework) | `1.15.1` | `1.16.1` |
| [github.com/hashicorp/terraform-plugin-framework-validators](https://github.com/hashicorp/terraform-plugin-framework-validators) | `0.18.0` | `0.19.0` |
| [github.com/hashicorp/terraform-plugin-log](https://github.com/hashicorp/terraform-plugin-log) | `0.9.0` | `0.10.0` |
| [github.com/hashicorp/terraform-plugin-mux](https://github.com/hashicorp/terraform-plugin-mux) | `0.20.0` | `0.21.0` |
| [github.com/hashicorp/terraform-plugin-sdk/v2](https://github.com/hashicorp/terraform-plugin-sdk) | `2.37.0` | `2.38.1` |
| [github.com/hashicorp/vault-plugin-auth-jwt](https://github.com/hashicorp/vault-plugin-auth-jwt) | `0.24.1` | `0.25.0` |
| [github.com/hashicorp/vault-plugin-auth-kerberos](https://github.com/hashicorp/vault-plugin-auth-kerberos) | `0.15.0` | `0.16.0` |
| [github.com/hashicorp/vault-plugin-auth-oci](https://github.com/hashicorp/vault-plugin-auth-oci) | `0.19.0` | `0.20.0` |



Updates `cloud.google.com/go/compute/metadata` from 0.8.0 to 0.9.0
- [Release notes](https://github.com/googleapis/google-cloud-go/releases)
- [Changelog](https://github.com/googleapis/google-cloud-go/blob/main/CHANGES.md)
- [Commits](https://github.com/googleapis/google-cloud-go/compare/v0.8.0...v0.9.0)

Updates `cloud.google.com/go/iam` from 1.5.2 to 1.5.3
- [Release notes](https://github.com/googleapis/google-cloud-go/releases)
- [Changelog](https://github.com/googleapis/google-cloud-go/blob/main/CHANGES.md)
- [Commits](https://github.com/googleapis/google-cloud-go/compare/iam/v1.5.2...iam/v1.5.3)

Updates `github.com/Azure/azure-sdk-for-go/sdk/azcore` from 1.19.0 to 1.20.0
- [Release notes](https://github.com/Azure/azure-sdk-for-go/releases)
- [Commits](https://github.com/Azure/azure-sdk-for-go/compare/sdk/azcore/v1.19.0...sdk/azcore/v1.20.0)

Updates `github.com/Azure/azure-sdk-for-go/sdk/azidentity` from 1.11.0 to 1.13.1
- [Release notes](https://github.com/Azure/azure-sdk-for-go/releases)
- [Commits](https://github.com/Azure/azure-sdk-for-go/compare/sdk/azcore/v1.11.0...sdk/azidentity/v1.13.1)

Updates `github.com/hashicorp/consul/api` from 1.32.1 to 1.33.0
- [Release notes](https://github.com/hashicorp/consul/releases)
- [Changelog](https://github.com/hashicorp/consul/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/consul/compare/api/v1.32.1...api/v1.33.0)

Updates `github.com/hashicorp/go-version` from 1.7.0 to 1.8.0
- [Release notes](https://github.com/hashicorp/go-version/releases)
- [Changelog](https://github.com/hashicorp/go-version/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/go-version/compare/v1.7.0...v1.8.0)

Updates `github.com/hashicorp/terraform-plugin-framework` from 1.15.1 to 1.16.1
- [Release notes](https://github.com/hashicorp/terraform-plugin-framework/releases)
- [Changelog](https://github.com/hashicorp/terraform-plugin-framework/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/terraform-plugin-framework/compare/v1.15.1...v1.16.1)

Updates `github.com/hashicorp/terraform-plugin-framework-validators` from 0.18.0 to 0.19.0
- [Release notes](https://github.com/hashicorp/terraform-plugin-framework-validators/releases)
- [Changelog](https://github.com/hashicorp/terraform-plugin-framework-validators/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/terraform-plugin-framework-validators/compare/v0.18.0...v0.19.0)

Updates `github.com/hashicorp/terraform-plugin-go` from 0.28.0 to 0.29.0
- [Release notes](https://github.com/hashicorp/terraform-plugin-go/releases)
- [Changelog](https://github.com/hashicorp/terraform-plugin-go/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/terraform-plugin-go/compare/v0.28.0...v0.29.0)

Updates `github.com/hashicorp/terraform-plugin-log` from 0.9.0 to 0.10.0
- [Release notes](https://github.com/hashicorp/terraform-plugin-log/releases)
- [Changelog](https://github.com/hashicorp/terraform-plugin-log/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/terraform-plugin-log/compare/v0.9.0...v0.10.0)

Updates `github.com/hashicorp/terraform-plugin-mux` from 0.20.0 to 0.21.0
- [Release notes](https://github.com/hashicorp/terraform-plugin-mux/releases)
- [Changelog](https://github.com/hashicorp/terraform-plugin-mux/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/terraform-plugin-mux/compare/v0.20.0...v0.21.0)

Updates `github.com/hashicorp/terraform-plugin-sdk/v2` from 2.37.0 to 2.38.1
- [Release notes](https://github.com/hashicorp/terraform-plugin-sdk/releases)
- [Changelog](https://github.com/hashicorp/terraform-plugin-sdk/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/terraform-plugin-sdk/compare/v2.37.0...v2.38.1)

Updates `github.com/hashicorp/vault-plugin-auth-jwt` from 0.24.1 to 0.25.0
- [Release notes](https://github.com/hashicorp/vault-plugin-auth-jwt/releases)
- [Changelog](https://github.com/hashicorp/vault-plugin-auth-jwt/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/vault-plugin-auth-jwt/compare/v0.24.1...v0.25.0)

Updates `github.com/hashicorp/vault-plugin-auth-kerberos` from 0.15.0 to 0.16.0
- [Release notes](https://github.com/hashicorp/vault-plugin-auth-kerberos/releases)
- [Changelog](https://github.com/hashicorp/vault-plugin-auth-kerberos/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/vault-plugin-auth-kerberos/compare/v0.15.0...v0.16.0)

Updates `github.com/hashicorp/vault-plugin-auth-oci` from 0.19.0 to 0.20.0
- [Release notes](https://github.com/hashicorp/vault-plugin-auth-oci/releases)
- [Changelog](https://github.com/hashicorp/vault-plugin-auth-oci/blob/main/CHANGELOG.md)
- [Commits](https://github.com/hashicorp/vault-plugin-auth-oci/compare/v0.19.0...v0.20.0)

Updates `github.com/stretchr/testify` from 1.11.0 to 1.11.1
- [Release notes](https://github.com/stretchr/testify/releases)
- [Commits](https://github.com/stretchr/testify/compare/v1.11.0...v1.11.1)

Updates `golang.org/x/oauth2` from 0.30.0 to 0.31.0
- [Commits](https://github.com/golang/oauth2/compare/v0.30.0...v0.31.0)

Updates `google.golang.org/api` from 0.248.0 to 0.251.0
- [Release notes](https://github.com/googleapis/google-api-go-client/releases)
- [Changelog](https://github.com/googleapis/google-api-go-client/blob/main/CHANGES.md)
- [Commits](https://github.com/googleapis/google-api-go-client/compare/v0.248.0...v0.251.0)

---
updated-dependencies:
- dependency-name: cloud.google.com/go/compute/metadata
  dependency-version: 0.9.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: cloud.google.com/go/iam
  dependency-version: 1.5.3
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/Azure/azure-sdk-for-go/sdk/azcore
  dependency-version: 1.20.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/Azure/azure-sdk-for-go/sdk/azidentity
  dependency-version: 1.13.1
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/consul/api
  dependency-version: 1.33.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/go-version
  dependency-version: 1.8.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/terraform-plugin-framework
  dependency-version: 1.16.1
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/terraform-plugin-framework-validators
  dependency-version: 0.19.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/terraform-plugin-go
  dependency-version: 0.29.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/terraform-plugin-log
  dependency-version: 0.10.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/terraform-plugin-mux
  dependency-version: 0.21.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/terraform-plugin-sdk/v2
  dependency-version: 2.38.1
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/vault-plugin-auth-jwt
  dependency-version: 0.25.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/vault-plugin-auth-kerberos
  dependency-version: 0.16.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/hashicorp/vault-plugin-auth-oci
  dependency-version: 0.20.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: github.com/stretchr/testify
  dependency-version: 1.11.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: gomod-backward-compatible
- dependency-name: golang.org/x/oauth2
  dependency-version: 0.31.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
- dependency-name: google.golang.org/api
  dependency-version: 0.251.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: gomod-backward-compatible
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Ben Ash <32777270+benashz@users.noreply.github.com>
2025-12-04 20:22:52 +00:00
Steven Clark
1a036c522c
Add missing docs for field not_before_duration on vault_pki_secret_backend_root_cert (#2680) 2025-12-04 09:43:41 -05:00
Vijayavel Sekar
3489225324
fix LDAP auth tune block read failure caused by extra /tune in API path (#2676)
---------

Co-authored-by: Thy Ton <maithytonn@gmail.com>
2025-12-04 00:17:12 -08:00
siyer-corp
4d65cb4577
Add support for self managed workflow for rootless static roles in Oracle Secret Engine (#2661) 2025-12-03 22:27:56 +05:30
Balaji
688d61290d
ephemeral/aws: Add Vault AWS static access credentials ephemeral resource. (#2657)
* ephemeral/aws: Add Vault AWS static access credentials ephemeral resource.

* Refactor: Use mount field attribute instead of deprecated backend.

* Add docstrings to AWS ephemeral resource functions and models.

* Update docs to reflect backend to mount changes.
2025-12-02 12:08:53 +05:30
harshit-nema
0ac883a468
Vault 40734/aws access creds ephemeral resource (#2659)
* Add ephemeral AWS access credentials resource, tests and docs.

* Add lease start time and security token constants.

* Code and test added for aws_access_credentials ephemeral resource

* Mount implemented and retry logic removed

* Mount added in the test case, and test case on assume role removed.

* Setting ephemeral name as creds

* WriteWithContext added for credType=sts

* Comments added for the code implementation

* Comments added for Open method

* Removed duplicate field from consts.go

---------

Co-authored-by: Balaji <balaji.b@hashicorp.com>
2025-12-02 11:33:36 +05:30
Vijayavel Sekar
92d408dff2
Implement ephemeral resources for gcp (#2655)
* VAULT-40727 Ephemeral implementation for GCP

* VAULT-40727 Acceptance testing for gcp_service_account_key

* VAULT-40727 Acceptance testing for gcp_oauth2_access_token

* VAULT-40727 Retry logic added to fix race conditions

* VAULT-40727 Retry with backoff algorithm converted to use the cenkalti internal library

* VAULT-40727 Replaced depricated TestAccPreCheck function with acctestutil library

* VAULT-40727 Addressed PR review comments

* VAULT-40727 Addressed PR sescond pass review comments

* VAULT-40727 Removed duplicate constant

* VAULT-40727 Addressed PR third pass review comments

* VAULT-40727 Addressed PR third pass review comment on regexp
2025-12-01 11:06:10 -05:00
mickael-hc
fc0050237e
Update changelog with links to discuss for v5.5.0 release (#2668) 2025-11-21 18:54:24 +00:00
aahel
1f4beca5bd
added vault_azure_access_credentials ephemeral resource (#2654)
* added azure_access_credentials ephemeral resource

* minor refactor

* added doc

* added changelog entry

* minor fix

* fixed test

* added retry with backoff and removed changelog

* rename var and use consts in schema

* checking status code as well for retry

* minor refactor

* reduced defaultNumSequentialSuccesses to 4

* fix doc
2025-11-21 22:56:47 +05:30
vinay-gopalan
148e86b088
Prepare for v5.5.0 release (#2663) 2025-11-20 18:01:56 +00:00
vinay-gopalan
9caa63cb74
Support not_before_duration parameter on PKI root certs (#2664) 2025-11-20 09:20:54 -08:00
Rachel Culpepper
96ababbb19
Add alias_metadata field (#2547)
* add token_auth_metadata field

* add token_auth_metadata field to auth role endpoints

* add skip functions for tests

* add docs and changelog

* add description

* change name to alias_metadata

* fix merge errors

* fix formatting
2025-11-17 15:58:48 -05:00
aahel
882bc7f409
set deny_null_bind default to true (#2622)
* set deny_null_bind default to true

* fix setting default

* fixed dault value

* removed stale changes

* minor fix

* added changelog

---------

Co-authored-by: harshit-nema <harshit.nema@hashicorp.com>
2025-11-14 18:30:49 +00:00
vinay-gopalan
55d0009d8f
update slack channel in release workflow (#2647) 2025-11-04 00:41:39 +00:00
vinay-gopalan
0908bc19d3
Resolve security scan vulnerability in github.com/go-viper/mapstructure/v2 (#2646) 2025-11-03 23:34:49 +00:00
vinay-gopalan
a78a7dbf32
Prepare for v5.4.0 release (#2645) 2025-11-03 14:48:03 -08:00
Zlaticanin
7f78d9bb7c
Add support for Azure Static Secrets (#2635)
* Add support for Azure Static Secrets

---------

Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
2025-11-03 15:14:10 -07:00
vinay-gopalan
4b0ea0e164
Upgrade go version and acceptance test matrix (#2640) 2025-11-03 20:12:16 +00:00
Vijayavel Sekar
4fb815aeee
Add ttl and max_ttl to gcp secret backend (#2627)
* VAULT-39758 add ttl and max_ttl to gcp secret backend

* VAULT-39758 added change log

* VAULT-39758 GetImportTestStep update for ttl and max_ttl field

* VAULT-39758 logic change for v1.16 and negative testing scenario added

* VAULT-39758 Negative testing by removing ttl

* VAULT-39758 Removed 1.16 version check as the fields are available since 1.16
2025-11-03 05:35:49 +00:00
Vijayavel Sekar
8894ca55cc
VAULT-39760 Alias attributes and role id added to gcp auth backend (#2636)
* VAULT-39760 alias attributes and role id added to gcp auth backend

* VAULT-39760 Updating PR link to change log

* VAULT-39760 Updated computed as true

* VAULT-39760 Acceptance test update
2025-11-03 10:46:40 +05:30
harshit-nema
bbb0327710
VAULT-39750 Added parameters : request_timeout, dereference_aliases, enable_samaccountname_login, anonymous_group_search to LDAP Auth Method (#2634)
* Code modified to add following parameters:request_timeout,dereference_aliases,enable_samaccountname_login,anonymous_group_search in ldap_auth_backend resource

* TestFieldRequestTimeoutValidation method modified in resource_ldap_auth_backend_test.go file

* Version check condition added for enable_samaccountname_login parameter in resource_ldap_auth_backend_test.go file

* test cases are updated with SkipFunc method for vault version check

* Removing unused method isSamAccountNameLoginSupported

* Handled the test failure in acceptance test

* Optional field details added

* Test case added for req_timeout, dereference_aliases, enable_samaccountname_login, anonymous_group_search parameters

* Test case added to verify defaults for the added parameters in LDAP Auth Config

* Added backward compatibility check for enable_samaccountname_login parameter

* Removing FieldEnableSamaccountnameLogin from ldapAuthBackendFields list

* PR link updated

* Comments updated for argument:enable_samaccountname_login

* Removed duplicated
2025-10-31 11:41:02 +05:30
Shilpa M
ebd76c0598
VAULT-39757_TFVP_Parity_Azure_Secret_Engine (#2642) 2025-10-31 11:12:05 +05:30
Balaji
74747deffd
secrets/aws: Add mfa_serial_number field to AWS Secret Backend role. (#2637)
* secrets/aws: Add mfa_serial_number field to AWS Secret Backend role.

* secrets/aws: Update CHANGELOG.
2025-10-31 09:41:23 +05:30
Steven Clark
08925e862f
Add new resource SPIFFE config (#2620)
* WIP: Add support for SPIFFE auth configuration

* use api model technique

* Address import issues

* Rename spiffe object to SpiffeAuthConfigModel

* Import without ID

* Leverage API model again with StringNull setting

* Rename and implement ResourceWithImportState

* Fix comment

* Remove support for parsing namespaces from import ID

* WIP Add SPIFFE role resource

* Add new generic token model for auth roles and new framework

* godocs and various small tweaks

* Rename resource name to match existing pattern and add docs

* Add cl

* Add ability to filter tests by Vault version

* Revert "Add ability to filter tests by Vault version"

This reverts commit 0a8c445a199230113ffac763171730fdaa8dfd9c.

* Review feedback

* Filter tests by Vault version - take 2

* Apply suggestions from code review

Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>

* PR feedback, remove text pre checks and a bad comment

* PR feedback: Rename helper methods names to match old names

---------

Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
2025-10-24 12:41:14 -04:00
aahel
44df8b3a78
add retry fields to azure backend config (#2629)
* add retry fields to azure backend config

* added docs and changelog

* used consts

* fix test

* fix default handling logic

* addressed review comments

* change schema type to int for max retry fields

* minor fix

* fix tests

* refactor import tests

* added pr link in changelog
2025-10-24 15:07:28 +00:00
Balaji
e7faa3807b
secrets/aws: Add max_retries field to AWS Secret Backend. (#2623)
* secrets/aws: Add max_retries field to AWS Secret Backend.

* secrets/aws: Update CHANGELOG.

* Fix max_retries handling in AWS Secret Backend and add tests for various configurations.

* Update max_retries handling in AWS Secret Backend to set default value and enhance tests.

* Update AWS Secret Backend tests to use updated lease TTL field names.
2025-10-18 10:23:31 +05:30
siyer-corp
a40720c817
VAULT-39756: Add support for allowed_sts_header_values associated fo aws auth client (#2631)
* VAULT-39756: Add support for allowed_sts_header_values associated with /auth/aws/config/client endpoint
2025-10-16 12:25:43 +05:30
Thy Ton
50507cc1a9
merge auth resource tune block fixes and addition and finalize docs (#2625)
* merge tune block fields using user provided values and tune API response - JWT (#2560)

* merge tune block fields using user provided values and tune API response - GitHub and generic auth (#2565)

* document behavior changes on CHANGELOG and 5.X upgrade guide

* add tune block and merge its fields using user provided values and tune API response - SAML (#2566)

* merge tune block fields using user provided values and tune API response - GCP and OCI (#2596)

* change tune type from schema.TypeSet to schema.TypeList and add tune block to LDAP and Okta (#2602)

* change tune type from schema.Set to schema.TypeList with MatItems:1 to ref individual fields using .0.field syntax

* mark token_max_ttl, token_ttl, and token_type conflict with tune block fields
2025-10-15 18:52:20 -07:00
Ben Ash
8b4592330c
CI: drop bitnami openldap test image (#2626) 2025-10-13 11:18:20 -07:00
Steven Clark
65368d23d0
Fix vault_pki_secret_backend_crl_config to support setting boolean fields to false (#2615)
* Fix vault_pki_secret_backend_crl_config to set disable to false

 - Fix `vault_pki_secret_backend_crl_config` to send fields to the
   Vault endpoint when they are set to the zero based value.
   This mainly allows it to now disable options that had been
   previously set.

* Add cl

* Limit new testCrlZeroValues test to enterprise runs
2025-10-02 11:14:10 -04:00
Constantin Biguet
d9f5387ee3
move root_password_ttl field from azure_secret_backend_role to azure_secret_backend (#2617) 2025-09-26 09:02:13 -05:00
Steven Clark
c3cffdf981
Use OID in our docs from reserved space defined in RFC5612. (#2608)
- Instead of using a reserved oid from LetsEncrypt in our
   documentation (1.3.6.1.4.1.44947.1.2.4),
   use 1.3.6.1.4.1.32473.1.2.4, which is in the reserved space
   for docs and examples based on RFC 5612
2025-09-19 14:13:34 -04:00