Skip to content
This repository has been archived by the owner on Jan 25, 2023. It is now read-only.

Releases: hashicorp/terraform-google-vault

v0.2.0

28 Jun 10:54
48e8fc5
Compare
Choose a tag to compare

Modules affected

  • vault-cluster [BACKWARDS INCOMPATIBLE]
  • vault-lb-fr [BACKWARDS INCOMPATIBLE]

Description

All the modules are now terraform 0.12.0 compatible. Note that this means the modules are no longer compatible with terraform 0.11 and under. Starting this release, you must use terraform 0.12.0 or greater to use this module.

All the module variables have been updated to use concrete types based on the new type system introduced in terraform 0.12.0. You can learn more about the types in the official documentation.

Note that as part of this, we switched to using null to indicate unset values when passing them through to resources. If you were previously using a 0 value ("" for strings and 0 for numbers), review the module variables.tf file to double check if the 0 value has been converted to a null.

Related links

v0.1.3

21 Dec 10:31
70e8e8d
Compare
Choose a tag to compare

Modules affected

  • vault-cluster
  • run-vault
  • install-vault

Description

  • Allows vault-cluster to use a different project id for the base compute image
  • Fixes intermittent dependency errors related to bucket policies
  • vault-cluster now can optionally create its own service account to operate the cluster
  • Adds examples on authenticating to Vault using GCP with both the iam and gce methods
  • Adds example on auto-unsealing a vault cluster
  • run-vault now supports enabling auto-unsealing and setting the necessary KMS key for it
  • Fixes bug where Vault wouldn't initialize when using an external service account due to missing bucket permissions
  • install-vault now supports installing vault and consul from an arbitrary URL, which allows installing Vault and Consul enterprise

Related links

#33 #34 #36 #37

v0.1.2

04 Dec 13:23
cf2f75a
Compare
Choose a tag to compare

Modules affected

vault-cluster, run-vault

Description

The vault-cluster module now

  • Allows specifying to which project vault-cluster will be deployed, by adding a project variable for each vault instance as well as a project variable for the network and firewall rules.
  • Uses Regional Managed Instance Group instead of Zonal Managed Instance Group. This way, Vault nodes are spread across multiple Zones instead of being co-located in a single Zone, which means High Availability.

The run-vault module now

  • Enables the Vault UI by default

Additionally the private cluster example now creates a subnetwork with internal access to the Google API so Consul can fetch information about the cluster nodes without internet access, and this repository now has tests! 🎉

Related links

#24, #25, #31

v0.1.1

27 Sep 23:16
8165635
Compare
Choose a tag to compare

#21: Add a new variable, subnetwork_name to the vault-cluster module to allow the use of non-default subnets, or subnets with custom names.

v0.1.0

14 Aug 22:04
1f2bc40
Compare
Choose a tag to compare

#17, #19: Add support for Vault 0.10.x. This includes fixes for the helper script and an update to run-vault which now generates a config file that is compatible with Vault 0.10.x.

We also included a fix that will address warnings seen in certain output values of the vault-cluster module.

Special thanks to @madmod for contributing to this release!

v0.0.4

25 May 06:13
Compare
Choose a tag to compare

v0.0.3

10 Nov 04:10
b4d3f6e
Compare
Choose a tag to compare
  • #4: Fix broken links. Update to the latest Consul and Vault versions.

v0.0.2

26 Oct 00:39
Compare
Choose a tag to compare
  • ENHANCEMENT: Allow for custom service account email and scopes (#3)
  • BUGFIX: Fixed various tags that should have been a list (#2)

Special thanks to @madmod for these updates!

v0.0.1

16 Sep 01:26
Compare
Choose a tag to compare

Initial release!