Skip to content
This repository has been archived by the owner on Feb 16, 2023. It is now read-only.

Releases: secrethub/terraform-provider-secrethub

v1.3.1

25 Feb 08:53
v1.3.1
9079b2f
Compare
Choose a tag to compare

Added

  • Add documentation for secrethub_dir resource and datasource (#127)

v1.3.0

09 Feb 10:50
v1.3.0
d0ae963
Compare
Choose a tag to compare

Added

  • Add secrethub_dir resource and data source (#121)

Changed

  • Allow setting credential_passphrase without explicitly setting credential (#125)
  • Remove secret at old path when secret path is updated (#120)
  • Upgrade secrethub-go (#124, #125)

v1.2.3

14 Sep 07:18
v1.2.3
cf96dea
Compare
Choose a tag to compare

Changelog

Added

  • Add installation instructions to the docs (#116)

v1.2.2

09 Sep 13:34
v1.2.2
87ff5f2
Compare
Choose a tag to compare

Changelog

Added

Deprecated

  • The old archive format for releases is deprecated and will be dropped for releases starting April 2021 (#114). If you have any scripts fetching the provider from GitHub releases, you can fetch the provider from the community registry or you can change your scripts to fetch the archives in the new format.

v1.2.1

09 Sep 10:18
v1.2.1
2f221d2
Compare
Choose a tag to compare

Changelog

Added

  • You can now leave out the credential field of the provider and have automatic detection pick it up. It will check SECRETHUB_IDENTITY_PROVIDER, SECRETHUB_CREDENTIAL environment variable and the credential file (defaults to ~/.secrethub/credential, but can be configured with SECRETHUB_CONFIG_DIR). (#105)
  • The releases from now on include binaries for FreeBSD and for ARM architectures (#108, #112)

v1.1.0

08 Jul 15:26
v1.1.0
debbea0
Compare
Choose a tag to compare

Added

  • New secrethub_service_gcp resource: Introducing keyless apps for Google Cloud Platform: applications running on Google's compute services (GCE, GKE, etc.) can now natively authenticate to SecretHub to fetch their secrets, without needing to manage another key. (#93)

v1.0.0

09 Apr 16:09
v1.0.0
1bb5786
Compare
Choose a tag to compare

We're finally releasing v1.0.0 of the SecretHub Terraform Provider. This release contains some minor changes and deprecations. But most importantly this release marks SecretHub's official support for the provider.

Added

  • charsets field has been added to the generate block in the secrets resource. This allows you to select characters used for secret generation. Options are all, alphanumeric, numeric, lowercase, uppercase, letters, symbols and human-readable.
  • min field has been added to the generate block in the secrets resource. This allows you to specify a minimum number of occurrences of characters from a character set in a generated secret.
  • i386/x86 builds for Windows and Linux are now released.

Changed

  • Examples now use Terraform 0.12 syntax.
  • Release archives are now use amd64 instead of 64-bit and darwin instead of macOS in their names.

Deprecated

  • The use_symbols field for secret generation is deprecated because it has been replaced by charsets.

Removed

  • The previously deprecated path_prefix field is no longer supported.

v0.3.0

30 Oct 13:07
v0.3.0
a78dcb9
Compare
Choose a tag to compare

This release adds everything you need to manage service accounts. Create service accounts that use a key-file or AWS native identity. You can then set access rules to give the accounts permission to the secrets it needs.

You can use this to provision your applications, CI runners or any other place you use SecretHub with their own service account.

Addded

  • Access Rule resource
  • Service resource
  • AWS Service resource

Deprecated

  • path_prefix, use Terraform's native variables instead. See examples/rds.tf for an example.

v0.2.0

28 Jun 10:00
b51be75
Compare
Choose a tag to compare

Added

  • Terraform v0.12 support

v0.1.0

30 Apr 13:25
36a2e72
Compare
Choose a tag to compare

Added

  • secrethub_secret resource
  • secrethub_secret data source