Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update fork from upstream #2

Merged
merged 113 commits into from
Jul 25, 2019
Merged

update fork from upstream #2

merged 113 commits into from
Jul 25, 2019

Commits on May 2, 2019

  1. Configuration menu
    Copy the full SHA
    36af280 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    ef14904 View commit details
    Browse the repository at this point in the history

Commits on May 3, 2019

  1. Configuration menu
    Copy the full SHA
    7207d43 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0ca3c86 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    5176afb View commit details
    Browse the repository at this point in the history
  4. Merge pull request #1 from DataDog/anatole/add-role-arns

    aws_secret_backend_role: support role_arns argument
    oxlay authored May 3, 2019
    Configuration menu
    Copy the full SHA
    c26f014 View commit details
    Browse the repository at this point in the history

Commits on May 8, 2019

  1. Configuration menu
    Copy the full SHA
    88ff545 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    dc957f6 View commit details
    Browse the repository at this point in the history

Commits on May 9, 2019

  1. Update resource_aws_auth_backend_role.go

    Fix for issue #385
    aaronmell authored May 9, 2019
    Configuration menu
    Copy the full SHA
    af4b2fb View commit details
    Browse the repository at this point in the history

Commits on May 10, 2019

  1. Configuration menu
    Copy the full SHA
    1b00822 View commit details
    Browse the repository at this point in the history
  2. Update vendor

    lawliet89 committed May 10, 2019
    Configuration menu
    Copy the full SHA
    8ec4f02 View commit details
    Browse the repository at this point in the history
  3. Fix tests

    lawliet89 committed May 10, 2019
    Configuration menu
    Copy the full SHA
    39968da View commit details
    Browse the repository at this point in the history

Commits on May 17, 2019

  1. Update README.md

    tyrannosaurus-becks authored May 17, 2019
    Configuration menu
    Copy the full SHA
    9d9ead9 View commit details
    Browse the repository at this point in the history
  2. Update README.md

    tyrannosaurus-becks authored May 17, 2019
    Configuration menu
    Copy the full SHA
    e3bd586 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    14b4a4c View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    b2c7347 View commit details
    Browse the repository at this point in the history
  5. add doc for new accessor attribute

    Joel Cressy committed May 17, 2019
    Configuration menu
    Copy the full SHA
    d542229 View commit details
    Browse the repository at this point in the history

Commits on May 23, 2019

  1. Configuration menu
    Copy the full SHA
    6d3ca53 View commit details
    Browse the repository at this point in the history
  2. Default skip_tls_verify to a boolean.

    skip_tls_verify expects a boolean, but defaulted to an empty string,
    which causes an error under 0.12.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    e189e87 View commit details
    Browse the repository at this point in the history
  3. Fix V2GenericSecret test value.

    The test case for updating a v2 generic secret had a check function that
    hardcoded in the initial value, and then proceeded to check that against
    the updated value, which would never work.
    
    This updates to add a check function for the updated config, with the
    updated value coded in.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    85b086e View commit details
    Browse the repository at this point in the history
  4. Always set the backend path in state with no trailing /.

    0.12 complained about our plan changing because we were interpolating a
    backend's path. Backend paths cannot be specified using a trailing / but
    are always set in state with a trailing /. That means the plan will
    always change when creating a backend and using it in the same request.
    
    This commit changes that to set the backend in state with no trailing
    slash, which resolves the issue because it will always match user input
    now. This may be considered a breaking change.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    eee982a View commit details
    Browse the repository at this point in the history
  5. Accept path or contents for GCP test creds.

    Modify provider_test to load GCP test creds from file _or_ accept them
    as the contents of the file. Also, run go mod tidy.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    4a96d7c View commit details
    Browse the repository at this point in the history
  6. Update GCP roleset test with new project field.

    The service_account_project field the tests were expecting from the API
    has been transitioned to the project field. Update the test to check the
    right field.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    eacd0b5 View commit details
    Browse the repository at this point in the history
  7. Update auth backend tests for new state format.

    We're storing the path in state without the trailing slash, and we need
    to update the test that assumes we'll have the trailing slash.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    db5a63e View commit details
    Browse the repository at this point in the history
  8. Update OIDC test to 0.12 syntax.

    Blocks can no longer be specified using =.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    213dc66 View commit details
    Browse the repository at this point in the history
  9. Fix OIDC test to use 0.12 syntax.

    Blocks can no longer be specified using =.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    0ae6524 View commit details
    Browse the repository at this point in the history
  10. Update tested error message.

    Update the error message we're testing agains, as it has changed in
    0.12.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    4a7ae49 View commit details
    Browse the repository at this point in the history
  11. Fix double list.

    The basic LDAP auth backend group test had policies specified as a list,
    with the util function for turning a slice into a Terraform list inside
    that list. Except the util helper also returned the square brackets, so
    we had `[[item, item]]` instead of `[item, item]`. In Terraform 0.11,
    this was fine. In Terraform 0.12, it is not.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    7efbce8 View commit details
    Browse the repository at this point in the history
  12. Fix renewal logic error.

    It appears 0.12 doesn't consider HasChange true when the change has been
    marked by CustomizeDiff? By refactoring the logic for checking if
    renewal is necessary into a helper function and calling that function
    again instead of HasChange we can work around this limitation.
    paddycarver committed May 23, 2019
    Configuration menu
    Copy the full SHA
    c86dd7d View commit details
    Browse the repository at this point in the history

Commits on May 24, 2019

  1. Paramaterize V2 Generic Secret tests.

    Write to a different path with every test run, so our version is
    predictable.
    paddycarver committed May 24, 2019
    Configuration menu
    Copy the full SHA
    95ab65e View commit details
    Browse the repository at this point in the history
  2. Fix our v2 Generic Secret tests.

    Test that sending the version explicitly works, and also test that
    retrieving the latest works.
    paddycarver committed May 24, 2019
    Configuration menu
    Copy the full SHA
    d5769b2 View commit details
    Browse the repository at this point in the history
  3. Make DB statements a list for Postgres backend.

    Make our postgres database secret backend use a list of statements for
    creation, revocation, rollback, and renew, as the API has updated to use
    a list for those fields. This is a breaking change, as we're changing
    the schema type, but we coded in support for previous versions of the
    API that returned those fields as strings, as well.
    paddycarver committed May 24, 2019
    Configuration menu
    Copy the full SHA
    a531e19 View commit details
    Browse the repository at this point in the history
  4. Fix invalid d.Sets.

    The bound principal arns for the AWS auth role backend were being set
    incorrectly, because we were keying off what the user had in the config
    to determine whether the response should be a string or a list. But the
    server always responded with a list, no matter what was sent. We updated
    to remove the string version, as we're doing a major release anyways,
    and to test the response type before setting it so we don't set the
    wrong type.
    
    Login was also trying to set a lease_id that doesn't exist in the
    schema, so we just removed that Set call.
    paddycarver committed May 24, 2019
    Configuration menu
    Copy the full SHA
    ec5735c View commit details
    Browse the repository at this point in the history

Commits on May 27, 2019

  1. Remove default TTLs for vault_gcp_secret_backend

    The default in Vault API docs are "0" which refers to the system TTL
    settings. The resource should not attempt to set its own defaults, which
    is going to be surprising for users
    lawliet89 committed May 27, 2019
    Configuration menu
    Copy the full SHA
    3f2de5b View commit details
    Browse the repository at this point in the history

Commits on May 31, 2019

  1. Configuration menu
    Copy the full SHA
    f75c01b View commit details
    Browse the repository at this point in the history

Commits on Jun 3, 2019

  1. Configuration menu
    Copy the full SHA
    0049bd4 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #431 from terraform-providers/run-go-mod-vendor

    Vendor the go-rootcerts package
    tyrannosaurus-becks authored Jun 3, 2019
    Configuration menu
    Copy the full SHA
    f9a67f8 View commit details
    Browse the repository at this point in the history
  3. Merge pull request #382 from Ninir/f-vault-aws-backend-role

    [AWS Auth Backend Role] Recreate the resource if resolve_aws_unique_ids is set to false
    tyrannosaurus-becks authored Jun 3, 2019
    Configuration menu
    Copy the full SHA
    1fe8cce View commit details
    Browse the repository at this point in the history
  4. Merge pull request #407 from DataDog/master

    aws_secret_backend_role: support role_arns argument
    tyrannosaurus-becks authored Jun 3, 2019
    Configuration menu
    Copy the full SHA
    cc0cd7e View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    84d79ee View commit details
    Browse the repository at this point in the history
  6. Merge pull request #413 from lawliet89/vault-1.1.2

    Update dependencies to Vault 1.1.2
    tyrannosaurus-becks authored Jun 3, 2019
    Configuration menu
    Copy the full SHA
    8bcdcff View commit details
    Browse the repository at this point in the history
  7. Merge pull request #415 from jtcressy/master

    Implement tests alongside an improved fix for #368
    tyrannosaurus-becks authored Jun 3, 2019
    Configuration menu
    Copy the full SHA
    f96e78d View commit details
    Browse the repository at this point in the history
  8. Merge pull request #420 from jtcressy/add_accessor_attributes_auth_mo…

    …unts
    
    Implement "accessor" attribute on vault_okta_auth_backend
    tyrannosaurus-becks authored Jun 3, 2019
    Configuration menu
    Copy the full SHA
    b017c4f View commit details
    Browse the repository at this point in the history
  9. Merge pull request #426 from lawliet89/gcp-engine-def

    Remove default TTLs for vault_gcp_secret_backend
    tyrannosaurus-becks authored Jun 3, 2019
    Configuration menu
    Copy the full SHA
    6d0eeb6 View commit details
    Browse the repository at this point in the history

Commits on Jun 4, 2019

  1. Configuration menu
    Copy the full SHA
    ea43206 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    0a3826d View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    43e241a View commit details
    Browse the repository at this point in the history
  4. Merge pull request #433 from terraform-providers/child-token-namespace

    Read Namespace Information from Token
    tyrannosaurus-becks authored Jun 4, 2019
    Configuration menu
    Copy the full SHA
    c5c6b0c View commit details
    Browse the repository at this point in the history

Commits on Jun 5, 2019

  1. Fix aws_auth_backend_role.

    Remove all the deprecated singular versions from the
    aws_auth_backend_role resource, and always set the plural versions.
    Fixes an error with d.Set, should be backwards compatible with Vault
    versions. Is a breaking change for the provider.
    paddycarver committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    02bf82c View commit details
    Browse the repository at this point in the history
  2. Fix typo in client_secret for azure_auth_backend.

    Fix a type when calling d.Set on the client_secret for the
    azure_auth_backend_config resource.
    paddycarver committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    acd4148 View commit details
    Browse the repository at this point in the history
  3. Fix broken tests.

    Finish fixing d.Sets that are using the wrong types:
    
    * pki_secret_backend_config_urls' issuing_certificates,
      crl_distribution_points, and ocsp_servers are now lists, to match the
      API.
    * pki_secret_backend_role's allowed_uri_sans, allowed_other_sans, ou,
      organization, country, locality, province, street_address, and
      postal_code fields are now lists, to match the API.
    * pki_secret_backend_sign's ca_chain field is now a list, to match the
      API.
    * token's no_parent, renewable, and num_uses fields are now computed.
    
    Only set the client secret for Azure's auth backend if it's in the API
    response, so we don't overwrite it with empty data.
    
    Even with TF_SCHEMA_PANIC_ON_ERROR, all non-database/rabbitMQ/enterprise
    tests now pass.
    paddycarver committed Jun 5, 2019
    Configuration menu
    Copy the full SHA
    581e16d View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    67994fd View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    0889e92 View commit details
    Browse the repository at this point in the history
  6. Merge pull request #435 from terraform-providers/automate-acc-tests

    Run acceptance tests through CI
    tyrannosaurus-becks authored Jun 5, 2019
    Configuration menu
    Copy the full SHA
    f7a084b View commit details
    Browse the repository at this point in the history
  7. Merge pull request #434 from terraform-providers/env-token

    Allowing for the token to be read from the environment
    tyrannosaurus-becks authored Jun 5, 2019
    Configuration menu
    Copy the full SHA
    cc52a4d View commit details
    Browse the repository at this point in the history

Commits on Jun 6, 2019

  1. Configuration menu
    Copy the full SHA
    9b4e3c2 View commit details
    Browse the repository at this point in the history

Commits on Jun 10, 2019

  1. Don't remove cassandra values from state.

    Don't remove the values from the database_secret_backend_connection
    resource's cassandra block that the API doesn't return. Because we
    overwrite the whole block in state, we need to fall back on what's in
    state, which presumably came from the config.
    
    We'll miss any drift, but the API doesn't surface that information, so
    there's not much we can do about that.
    paddycarver committed Jun 10, 2019
    Configuration menu
    Copy the full SHA
    9da8631 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    7c295c6 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    ba6b7ba View commit details
    Browse the repository at this point in the history
  4. Remove commented out code

    lawliet89 committed Jun 10, 2019
    Configuration menu
    Copy the full SHA
    08954ec View commit details
    Browse the repository at this point in the history

Commits on Jun 11, 2019

  1. Configuration menu
    Copy the full SHA
    ff3003e View commit details
    Browse the repository at this point in the history
  2. Add namespace docs to sidebar (#441)

    * Was missed out in original PR #338
    petems authored and chrishoffman committed Jun 11, 2019
    Configuration menu
    Copy the full SHA
    199a82f View commit details
    Browse the repository at this point in the history
  3. Fix GCP auth backend role

    Add `project_id` and `bound_projects` back to request payload when creating/updating
    a GCP auth backend role
    Possible fix for #394
    hmakkapati committed Jun 11, 2019
    Configuration menu
    Copy the full SHA
    6bdcd74 View commit details
    Browse the repository at this point in the history
  4. Fix GCP auth role tests

    hmakkapati committed Jun 11, 2019
    Configuration menu
    Copy the full SHA
    158a6a6 View commit details
    Browse the repository at this point in the history

Commits on Jun 12, 2019

  1. Merge pull request #411 from hmakkapati/fix-gcp-auth-backend-role

    Fix GCP auth backend role
    tyrannosaurus-becks authored Jun 12, 2019
    Configuration menu
    Copy the full SHA
    271ee83 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    d7d15ad View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    b67ce87 View commit details
    Browse the repository at this point in the history
  4. v1.9.0

    tf-release-bot authored and TeamCity committed Jun 12, 2019
    Configuration menu
    Copy the full SHA
    2aa8217 View commit details
    Browse the repository at this point in the history
  5. Cleanup after v1.9.0 release

    tf-release-bot authored and TeamCity committed Jun 12, 2019
    Configuration menu
    Copy the full SHA
    f151ea2 View commit details
    Browse the repository at this point in the history

Commits on Jun 13, 2019

  1. Configuration menu
    Copy the full SHA
    a730650 View commit details
    Browse the repository at this point in the history
  2. Add STS TTLs to vault_aws_secret_backend_role

    Also make lists become sets
    lawliet89 committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    b62cc2c View commit details
    Browse the repository at this point in the history
  3. Update to Terraform 0.12.2.

    Keep on keeping on with tracking the latest.
    paddycarver committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    e6ce35d View commit details
    Browse the repository at this point in the history
  4. Update KV tests to create the mount.

    Don't rely on a cluster having a secret/ KV mount already, create one
    for each test.
    paddycarver committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    d822996 View commit details
    Browse the repository at this point in the history
  5. Remove deprecated fields.

    Anything that was deprecated in Terraform (not in Vault 1.1) is now
    marked as removed, in anticipation of a 2.0.0.
    paddycarver committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    8eda8f0 View commit details
    Browse the repository at this point in the history
  6. Fix aws auth backend login tests and nonce.

    Fix the handling of the aws_auth_backend_login nonce field, as it's only
    returned on the first request, and we need to not overwrite it with an
    empty string on subsequent reads.
    
    Also, fix the tests so they can be run using an environment variable,
    and stop using removed fields in the tests.
    paddycarver committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    fd7c373 View commit details
    Browse the repository at this point in the history
  7. Fix error message detection.

    0.12 changed the format of an error message on us, update the test to
    match.
    paddycarver committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    604f3d8 View commit details
    Browse the repository at this point in the history
  8. Remove namespace from state when not found.

    When a namespace isn't found during read, log that and remove it from
    state instead of panicking.
    paddycarver committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    1030496 View commit details
    Browse the repository at this point in the history
  9. Update rabbitmq_secret_backend_role vhost to block.

    The vault API accepts the vhost for rabbitmq_secret_backend_role as a
    string, but always returns it as a JSON object. There's no Terraform
    equivalent (maps can't have complex types as the values), so instead we
    turn it into a list (sets were having funky behavior with the hashes,
    and I didn't have time to fully look into it). This is a better UX than
    a JSON object marshalled into a string in the config, and allows reads
    to be consistent. It is, however, a breaking change.
    paddycarver committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    a2906cc View commit details
    Browse the repository at this point in the history
  10. Ignore verify_connection in rabbitmq_secret_backend test

    When doing an ImportStateVerify for rabbitmq_secret_backends, the
    verify_connection field isn't in the API response and so can't be set,
    so we need to ignore it.
    paddycarver committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    3c0f45a View commit details
    Browse the repository at this point in the history
  11. Minor spelling fixes

    petems committed Jun 13, 2019
    Configuration menu
    Copy the full SHA
    cc19811 View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    c2dfafd View commit details
    Browse the repository at this point in the history

Commits on Jun 19, 2019

  1. Make affected blocks attributes.

    We have some computed optional blocks that will exhibit the computed
    optional problem of 0.12. In 0.11, these blocks could be set like so
    `block = []` to set the block to an explicit empty value. This could be
    used to signal a return to the API default, or as a way to delete the
    entry the user entered. Because 0.12 makes a strict delineation between
    blocks and attributes, we need to tell Terraform to treat these blocks
    as attributes to preserve this behavior. See
    https://www.terraform.io/docs/extend/terraform-0.12-compatibility.html#computed-resource-attributes
    for more info.
    paddycarver committed Jun 19, 2019
    Configuration menu
    Copy the full SHA
    c3e9342 View commit details
    Browse the repository at this point in the history
  2. Add upgrade guide.

    paddycarver committed Jun 19, 2019
    Configuration menu
    Copy the full SHA
    183f98d View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    583d981 View commit details
    Browse the repository at this point in the history
  4. Merge pull request #446 from terraform-providers/0.12-sdk

    Upgrade to 0.12
    paddycarver authored Jun 19, 2019
    Configuration menu
    Copy the full SHA
    92bc67d View commit details
    Browse the repository at this point in the history
  5. Update CHANGELOG.md

    paddycarver authored Jun 19, 2019
    Configuration menu
    Copy the full SHA
    14a65ea View commit details
    Browse the repository at this point in the history
  6. Update CHANGELOG.md

    paddycarver authored Jun 19, 2019
    Configuration menu
    Copy the full SHA
    a4b8a19 View commit details
    Browse the repository at this point in the history
  7. Update CHANGELOG.md

    paddycarver authored Jun 19, 2019
    Configuration menu
    Copy the full SHA
    db3c053 View commit details
    Browse the repository at this point in the history
  8. v2.0.0

    tf-release-bot authored and TeamCity committed Jun 19, 2019
    Configuration menu
    Copy the full SHA
    0d7dedf View commit details
    Browse the repository at this point in the history
  9. Cleanup after v2.0.0 release

    tf-release-bot authored and TeamCity committed Jun 19, 2019
    Configuration menu
    Copy the full SHA
    913d220 View commit details
    Browse the repository at this point in the history

Commits on Jun 20, 2019

  1. Configuration menu
    Copy the full SHA
    5922a4c View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    23e3436 View commit details
    Browse the repository at this point in the history

Commits on Jun 27, 2019

  1. Configuration menu
    Copy the full SHA
    8ec617e View commit details
    Browse the repository at this point in the history
  2. Merge pull request #453 from hashitop/fix-missing-vault-policy-docume…

    …nt-menu
    
    Add sidebar menu link to vault_policy_document document
    bflad authored Jun 27, 2019
    Configuration menu
    Copy the full SHA
    256f7a6 View commit details
    Browse the repository at this point in the history

Commits on Jul 1, 2019

  1. Configuration menu
    Copy the full SHA
    c9d3cf9 View commit details
    Browse the repository at this point in the history
  2. Merge pull request #445 from petems/minor_spelling_fixes

    Minor spelling fixes
    tyrannosaurus-becks authored Jul 1, 2019
    Configuration menu
    Copy the full SHA
    d6cdd4b View commit details
    Browse the repository at this point in the history
  3. Merge pull request #439 from lawliet89/aws-auth

    Update AWS Auth Backend Role resources to take sets instead of lists
    tyrannosaurus-becks authored Jul 1, 2019
    Configuration menu
    Copy the full SHA
    1e9677c View commit details
    Browse the repository at this point in the history
  4. Merge pull request #455 from anhdat/add_list_support_for_jwt_auth_bac…

    …kend_role_bound_claims
    
    Add list type for bound claims of vault_jwt_auth_backend_role
    tyrannosaurus-becks authored Jul 1, 2019
    Configuration menu
    Copy the full SHA
    cae8ad3 View commit details
    Browse the repository at this point in the history

Commits on Jul 2, 2019

  1. Configuration menu
    Copy the full SHA
    f86f19d View commit details
    Browse the repository at this point in the history

Commits on Jul 3, 2019

  1. Configuration menu
    Copy the full SHA
    f9e8520 View commit details
    Browse the repository at this point in the history
  2. Fix code example

    lukassup authored Jul 3, 2019
    Configuration menu
    Copy the full SHA
    84ccd70 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    52a6e2b View commit details
    Browse the repository at this point in the history
  4. Mark data attribute sensitive

    Fixes #454
    ctrox committed Jul 3, 2019
    Configuration menu
    Copy the full SHA
    37f4b2b View commit details
    Browse the repository at this point in the history
  5. Merge pull request #457 from lukassup/patch-1

    Fix code example
    tyrannosaurus-becks authored Jul 3, 2019
    Configuration menu
    Copy the full SHA
    ad70445 View commit details
    Browse the repository at this point in the history
  6. Merge pull request #444 from lawliet89/aws-secret-role-ttl

    Add STS TTLs to `vault_aws_secret_backend_role`
    tyrannosaurus-becks authored Jul 3, 2019
    Configuration menu
    Copy the full SHA
    43f9e6e View commit details
    Browse the repository at this point in the history
  7. Merge pull request #456 from ctrox/data-read

    Always set attribute 'data' if read is disabled
    tyrannosaurus-becks authored Jul 3, 2019
    Configuration menu
    Copy the full SHA
    c8f7423 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    11680e8 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    fd11e18 View commit details
    Browse the repository at this point in the history

Commits on Jul 5, 2019

  1. v2.1.0

    tf-release-bot authored and TeamCity committed Jul 5, 2019
    Configuration menu
    Copy the full SHA
    92f58b3 View commit details
    Browse the repository at this point in the history

Commits on Jul 10, 2019

  1. Configuration menu
    Copy the full SHA
    502fa65 View commit details
    Browse the repository at this point in the history
  2. Update CHANGELOG.md

    megan07 authored Jul 10, 2019
    Configuration menu
    Copy the full SHA
    66b30f5 View commit details
    Browse the repository at this point in the history

Commits on Jul 11, 2019

  1. Configuration menu
    Copy the full SHA
    b61146b View commit details
    Browse the repository at this point in the history
  2. Merge pull request #466 from terraform-providers/add-ability-to-descr…

    …ibe-paths
    
    Add tool for analyzing Vault API coverage
    tyrannosaurus-becks authored Jul 11, 2019
    Configuration menu
    Copy the full SHA
    2c8fc78 View commit details
    Browse the repository at this point in the history