This repository has been archived by the owner on Feb 16, 2023. It is now read-only.
Releases: secrethub/terraform-provider-secrethub
Releases · secrethub/terraform-provider-secrethub
v1.3.1
v1.3.0
v1.2.3
v1.2.2
Changelog
Added
- Using Terraform 0.13, you can soon install the provider using the community registry. (#106, #107, #110, #109, #114)
Deprecated
- The old archive format for releases is deprecated and will be dropped for releases starting April 2021 (#114). If you have any scripts fetching the provider from GitHub releases, you can fetch the provider from the community registry or you can change your scripts to fetch the archives in the new format.
v1.2.1
Changelog
Added
- You can now leave out the credential field of the provider and have automatic detection pick it up. It will check
SECRETHUB_IDENTITY_PROVIDER
,SECRETHUB_CREDENTIAL
environment variable and the credential file (defaults to~/.secrethub/credential
, but can be configured withSECRETHUB_CONFIG_DIR
). (#105) - The releases from now on include binaries for FreeBSD and for ARM architectures (#108, #112)
v1.1.0
v1.0.0
We're finally releasing v1.0.0
of the SecretHub Terraform Provider. This release contains some minor changes and deprecations. But most importantly this release marks SecretHub's official support for the provider.
Added
charsets
field has been added to thegenerate
block in the secrets resource. This allows you to select characters used for secret generation. Options areall
,alphanumeric
,numeric
,lowercase
,uppercase
,letters
,symbols
andhuman-readable
.min
field has been added to thegenerate
block in the secrets resource. This allows you to specify a minimum number of occurrences of characters from a character set in a generated secret.- i386/x86 builds for Windows and Linux are now released.
Changed
- Examples now use Terraform 0.12 syntax.
- Release archives are now use
amd64
instead of64-bit
anddarwin
instead ofmacOS
in their names.
Deprecated
- The
use_symbols
field for secret generation is deprecated because it has been replaced bycharsets
.
Removed
- The previously deprecated
path_prefix
field is no longer supported.
v0.3.0
This release adds everything you need to manage service accounts. Create service accounts that use a key-file or AWS native identity. You can then set access rules to give the accounts permission to the secrets it needs.
You can use this to provision your applications, CI runners or any other place you use SecretHub with their own service account.
Addded
- Access Rule resource
- Service resource
- AWS Service resource
Deprecated
path_prefix
, use Terraform's native variables instead. See examples/rds.tf for an example.
v0.2.0
Added
- Terraform v0.12 support
v0.1.0
Added
secrethub_secret
resourcesecrethub_secret
data source