Skip to content

Commit

Permalink
Upgrade terraform-provider-vault to v4.3.0 (#544)
Browse files Browse the repository at this point in the history
This PR was generated via `$ upgrade-provider pulumi/pulumi-vault` with
significant manual tweaks:

- Removes the fork.patch. All instances of patch conflicts were in files
addressed by the [upstream removal of the hashicorp/vault
dependency](hashicorp/terraform-provider-vault#2251)
- either pertaining to package imports, use of an updated library, or
the patch dropped tests, which should not affect us either by presence
or absence.
- Removes the BUSL workaround patch due to ^^
- Migrates the remaining docs patch to a DocsEditRule
---

- Upgrading terraform-provider-vault from 4.2.0  to 4.3.0.
	Fixes #540
  • Loading branch information
guineveresaenger authored Jun 21, 2024
1 parent c5bf55a commit ea7f3f3
Show file tree
Hide file tree
Showing 170 changed files with 23,166 additions and 2,679 deletions.
1 change: 1 addition & 0 deletions patches/0001-dummy-for-module-resolution.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
This patch is intentionally empty so we can use the `upstream` submodule for dependency resolution, since the upstream provider does not follow Go module versioning standards.
2,043 changes: 0 additions & 2,043 deletions patches/0001-fork.patch

This file was deleted.

115 changes: 0 additions & 115 deletions patches/0002-remove-dependency-on-BUSL-code.patch

This file was deleted.

82 changes: 82 additions & 0 deletions provider/cmd/pulumi-resource-vault/bridge-metadata.json
Original file line number Diff line number Diff line change
Expand Up @@ -445,6 +445,9 @@
"allowed_managed_keys": {
"maxItemsOne": false
},
"allowed_response_headers": {
"maxItemsOne": false
},
"audit_non_hmac_request_keys": {
"maxItemsOne": false
},
Expand Down Expand Up @@ -483,6 +486,9 @@
}
}
},
"delegated_auth_accessors": {
"maxItemsOne": false
},
"elasticsearch": {
"maxItemsOne": false,
"elem": {
Expand Down Expand Up @@ -626,6 +632,9 @@
}
}
},
"passthrough_request_headers": {
"maxItemsOne": false
},
"postgresql": {
"maxItemsOne": false,
"elem": {
Expand Down Expand Up @@ -1151,11 +1160,20 @@
"allowed_managed_keys": {
"maxItemsOne": false
},
"allowed_response_headers": {
"maxItemsOne": false
},
"audit_non_hmac_request_keys": {
"maxItemsOne": false
},
"audit_non_hmac_response_keys": {
"maxItemsOne": false
},
"delegated_auth_accessors": {
"maxItemsOne": false
},
"passthrough_request_headers": {
"maxItemsOne": false
}
}
},
Expand Down Expand Up @@ -1225,11 +1243,20 @@
"allowed_managed_keys": {
"maxItemsOne": false
},
"allowed_response_headers": {
"maxItemsOne": false
},
"audit_non_hmac_request_keys": {
"maxItemsOne": false
},
"audit_non_hmac_response_keys": {
"maxItemsOne": false
},
"delegated_auth_accessors": {
"maxItemsOne": false
},
"passthrough_request_headers": {
"maxItemsOne": false
}
}
},
Expand Down Expand Up @@ -1310,11 +1337,20 @@
"allowed_managed_keys": {
"maxItemsOne": false
},
"allowed_response_headers": {
"maxItemsOne": false
},
"audit_non_hmac_request_keys": {
"maxItemsOne": false
},
"audit_non_hmac_response_keys": {
"maxItemsOne": false
},
"delegated_auth_accessors": {
"maxItemsOne": false
},
"passthrough_request_headers": {
"maxItemsOne": false
}
}
},
Expand Down Expand Up @@ -1349,6 +1385,12 @@
}
}
},
"token_bound_cidrs": {
"maxItemsOne": false
},
"token_policies": {
"maxItemsOne": false
},
"user": {
"maxItemsOne": false,
"elem": {
Expand Down Expand Up @@ -1418,6 +1460,18 @@
"current": "vault:pkiSecret/backendConfigCluster:BackendConfigCluster",
"majorVersion": 6
},
"vault_pki_secret_backend_config_est": {
"current": "vault:pkiSecret/backendConfigEst:BackendConfigEst",
"majorVersion": 6,
"fields": {
"audit_fields": {
"maxItemsOne": false
},
"authenticators": {
"maxItemsOne": true
}
}
},
"vault_pki_secret_backend_config_issuers": {
"current": "vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers",
"majorVersion": 6
Expand Down Expand Up @@ -1616,6 +1670,22 @@
}
}
},
"vault_plugin": {
"current": "vault:index/plugin:Plugin",
"majorVersion": 6,
"fields": {
"args": {
"maxItemsOne": false
},
"env": {
"maxItemsOne": false
}
}
},
"vault_plugin_pinned_version": {
"current": "vault:index/pluginPinnedVersion:PluginPinnedVersion",
"majorVersion": 6
},
"vault_policy": {
"current": "vault:index/policy:Policy",
"majorVersion": 6
Expand Down Expand Up @@ -2091,6 +2161,18 @@
"current": "vault:index/getNomadAccessToken:getNomadAccessToken",
"majorVersion": 6
},
"vault_pki_secret_backend_config_est": {
"current": "vault:pkiSecret/getBackendConfigEst:getBackendConfigEst",
"majorVersion": 6,
"fields": {
"audit_fields": {
"maxItemsOne": false
},
"authenticators": {
"maxItemsOne": false
}
}
},
"vault_pki_secret_backend_issuer": {
"current": "vault:pkiSecret/getBackendIssuer:getBackendIssuer",
"majorVersion": 6,
Expand Down
Loading

0 comments on commit ea7f3f3

Please sign in to comment.