Bump github.com/hashicorp/vault/sdk from 0.4.1 to 0.9.1
Bumps github.com/hashicorp/vault/sdk from 0.4.1 to 0.9.1.
Changelog
Sourced from github.com/hashicorp/vault/sdk's changelog.
0.9.1 (December 21st, 2017)
DEPRECATIONS/CHANGES:
- AppRole Case Sensitivity: In prior versions of Vault,
listoperations against AppRole roles would require preserving case in the role name, even though most other operations within AppRole are case-insensitive with respect to the role name. This has been fixed; existing roles will behave as they have in the past, but new roles will act case-insensitively in these cases.- Token Auth Backend Roles parameter types: For
allowed_policiesanddisallowed_policiesin role definitions in the token auth backend, input can now be a comma-separated string or an array of strings. Reading a role will now return arrays for these parameters.- Transit key exporting: You can now mark a key in the
transitbackend asexportableat any time, rather than just at creation time; however, once this value is set, it still cannot be unset.- PKI Secret Backend Roles parameter types: For
allowed_domainsandkey_usagein role definitions in the PKI secret backend, input can now be a comma-separated string or an array of strings. Reading a role will now return arrays for these parameters.- SSH Dynamic Keys Method Defaults to 2048-bit Keys: When using the dynamic key method in the SSH backend, the default is now to use 2048-bit keys if no specific key bit size is specified.
- Consul Secret Backend lease handling: The
consulsecret backend can now accept both strings and integer numbers of seconds for its lease value. The value returned on a role read will be an integer number of seconds instead of a human-friendly string.- Unprintable characters not allowed in API paths: Unprintable characters are no longer allowed in names in the API (paths and path parameters), with an extra restriction on whitespace characters. Allowed characters are those that are considered printable by Unicode plus spaces.
FEATURES:
- Transit Backup/Restore: The
transitbackend now supports a backup operation that can export a given key, including all key versions and configuration, as well as a restore operation allowing import into another Vault.- gRPC Database Plugins: Database plugins now use gRPC for transport, allowing them to be written in other languages.
- Nomad Secret Backend: Nomad ACL tokens can now be generated and revoked using Vault.
- TLS Cert Auth Backend Improvements: The
certauth backend can now match against custom certificate extensions via exact or glob matching, and additionally supports max_ttl and periodic token toggles.IMPROVEMENTS:
- auth/cert: Support custom certificate constraints [GH-3634]
... (truncated)
Commits
87b6919Cut version 0.9.1b971438Bump vars for 0.9.1ce4b28eSync in plugin updatesea5a3ddchangelog++706591eAllow log level to be specified in an env var (#3721)4122bc9changelog++10ab224Bust recovery cache after unsealed is set true to force migrationf46e6cafix consul tls settings (#3719)ccf10f6check schema and table before create it (#3716)8c4f369Revert grabbing lock in database Connection funcs- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) -
@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
Codecov Report
Merging #105 (3cb8e42) into main (f511134) will not change coverage. The diff coverage is
n/a.
:exclamation: Your organization is not using the GitHub App Integration. As a result you may experience degraded service beginning May 15th. Please install the Github App Integration for your organization. Read more.
@@ Coverage Diff @@
## main #105 +/- ##
=======================================
Coverage 59.45% 59.45%
=======================================
Files 10 10
Lines 550 550
=======================================
Hits 327 327
Misses 195 195
Partials 28 28
| Flag | Coverage Δ | |
|---|---|---|
| unittests | 59.45% <ø> (ø) |
Flags with carried forward coverage won't be shown. Click here to find out more.
OK, I won't notify you again about this release, but will get in touch when a new version is available. If you'd rather skip all updates until the next major or minor version, let me know by commenting @dependabot ignore this major version or @dependabot ignore this minor version. You can also ignore all major, minor, or patch releases for a dependency by adding an ignore condition with the desired update_types to your config file.
If you change your mind, just re-open this PR and I'll resolve any conflicts on it.