Skip to content

chore(deps): update terraform vault to ~> 5.9.0#1147

Open
renovate[bot] wants to merge 1 commit into2/mainfrom
renovate/vault-5.x
Open

chore(deps): update terraform vault to ~> 5.9.0#1147
renovate[bot] wants to merge 1 commit into2/mainfrom
renovate/vault-5.x

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Mar 14, 2026

This PR contains the following updates:

Package Type Update Change
vault (source) required_provider minor ~> 5.7.0~> 5.9.0

Pre-merge checks for Synapse or MAS workloads

  • The Release Notes do not describe any breaking changes.

  • The Upgrade document does not describe any breaking changes.


Release Notes

hashicorp/terraform-provider-vault (vault)

v5.9.0

Compare Source

BREAKING CHANGES:

  • Renamed all Vault 2.0 pki-external-ca resources from version 5.8.0 to a common prefix of vault_pki_external_ca_. (#​2838)

FEATURES:

  • New Resources: Add support for OS Secrets Engine with vault_os_secret_backend, vault_os_secret_backend_host, and vault_os_secret_backend_account resources for managing operating system credentials via SSH. Requires Vault 2.0.0+. (#​2865)
  • New Resources: vault_rotation_policy for managing rotation policies. Requires Vault 2.0.0+. (#​2844)
  • Add support for vault_quota_config resource. (#​2837)
  • New Resources: Add support for Vault Key Management secrets engine with resources for managing KMS providers (AWS KMS, Azure Key Vault, GCP Cloud KMS), cryptographic keys, key distribution, replication, and rotation (Vault Enterprise). (#​2802)
  • New Resources: vault_alicloud_secret_backend, vault_alicloud_secret_backend_role, and ephemeral resource vault_alicloud_access_credentials for managing AliCloud secrets engine. (#​2858, #​2874)
  • New Resource: vault_plugin_runtime for managing plugin runtimes in Vault's plugin runtimes catalog. Requires Vault 1.15 or later.(#​2835)
  • Add support for CORS configuration: vault_sys_config_cors resource and data source for managing and reading Vault's CORS (Cross-Origin Resource Sharing) settings. (#​2849)
  • New Ephemeral Resource: Add vault_generic_endpoint ephemeral resource with response field extraction from data, auth, wrap_info, and lease metadata.(#​2830)

IMPROVEMENTS:

  • vault_cf_auth_backend_config: Added cf_password_wo_version to trigger updates when only cf_password_wo changes.(#​2878)
  • vault_pki_secret_backend_config_acme: Added new fields that control the PKI ACME challenge worker IP ranges that they can connect. ([#​2839]#​2839)
  • Add support for metadata fields in azure_access_credentials and resource_azure_secret_backend_role resources. (#​2734
  • Add support for Enterprise Plugins in vault_plugin resource. (#​2707)
  • vault_ldap_secret_backend: Add self-managed support to ldap secrets engine. Requires Vault Enterprise 2.0+. (#​2845)
  • azure_static_role: Add support for importing existing credentials via new Vault import endpoint. (#​2756)
  • Updated dependencies:
    • cloud.google.com/go/auth v0.18.2 -> v0.20.0
    • cloud.google.com/go/cloudsqlconn v1.4.3 -> v1.20.2
    • cloud.google.com/go/iam v1.7.0 -> v1.9.0
    • filippo.io/edwards25519 v1.1.1 -> v1.2.0
    • github.com/Azure/azure-sdk-for-go/sdk/azcore v1.21.0 -> v1.21.1
    • github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.2 -> v1.12.0
    • github.com/aws/aws-sdk-go-v2 v1.41.5 -> v1.41.6
    • github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.21 -> v1.4.22
    • github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.21 -> v2.7.22
    • github.com/aws/aws-sdk-go-v2/service/iam v1.53.7 -> v1.53.8
    • github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.13.7 -> v1.13.8
    • github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.21 -> v1.13.22
    • github.com/aws/aws-sdk-go-v2/service/sts v1.41.10 -> v1.42.0
    • github.com/aws/smithy-go v1.24.3 -> v1.25.0
    • github.com/docker/docker v28.3.3+incompatible -> v28.5.2+incompatible
    • github.com/docker/go-connections v0.5.0 -> v0.7.0
    • github.com/fatih/color v1.18.0 -> v1.19.0
    • github.com/go-jose/go-jose/v3 v3.0.4 -> v3.0.5
    • github.com/go-jose/go-jose/v4 v4.1.3 -> v4.1.4
    • github.com/googleapis/gax-go/v2 v2.20.0 -> v2.21.0
    • github.com/hashicorp/consul/api v1.33.7 -> v1.34.1
    • github.com/hashicorp/go-secure-stdlib/plugincontainer v0.4.2 -> v0.5.0
    • github.com/hashicorp/terraform-plugin-mux v0.23.0 -> v0.23.1
    • github.com/hashicorp/vault/sdk v0.25.0 -> v0.25.1
    • github.com/jackc/pgtype v1.14.3 -> v1.14.4
    • github.com/oklog/run v1.1.0 -> v1.2.0
    • github.com/opencontainers/image-spec v1.1.0 -> v1.1.1
    • go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.61.0 -> v0.67.0
    • go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 -> v0.67.0
    • go.opentelemetry.io/otel v1.42.0 -> v1.43.0
    • go.opentelemetry.io/otel/metric v1.42.0 -> v1.43.0
    • go.opentelemetry.io/otel/trace v1.42.0 -> v1.43.0
    • golang.org/x/crypto v0.49.0 -> v0.50.0
    • golang.org/x/mod v0.33.0 -> v0.34.0
    • golang.org/x/net v0.52.0 -> v0.53.0
    • golang.org/x/sys v0.42.0 -> v0.43.0
    • golang.org/x/text v0.35.0 -> v0.36.0
    • golang.org/x/tools v0.42.0 -> v0.43.0
    • google.golang.org/api v0.273.1 -> v0.276.0
    • google.golang.org/genproto v0.0.0-20260319201613-d00831a3d3e7 -> v0.0.0-20260420184626-e10c466a9529
    • google.golang.org/genproto/googleapis/api v0.0.0-20260401001100-f93e5f3e9f0f -> v0.0.0-20260414002931-afd174a4e478
    • google.golang.org/genproto/googleapis/rpc v0.0.0-20260319201613-d00831a3d3e7 -> v0.0.0-20260414002931-afd174a4e478
    • google.golang.org/grpc v1.79.3 -> v1.80.0
    • k8s.io/utils v0.0.0-20260210185600-b8788abfbbc2 -> v0.0.0-20260319190234-28399d86e0b5

BUGS:

  • vault_consul_secret_backend: Fixed validation logic to allow computed token values by correcting the condition that checks for token presence during plan phase. (#​2823)
  • vault_pki_external_ca_secret_backend_acme_account: Provide eab_kid and eab_key values through the ACME account creation request. ([#​2851]#​2852)
  • provider/auth_login: Fix "Missing Region" error when using generic auth_login block for AWS authentication without explicit sts_region parameter. The provider now properly resolves AWS region from environment variables (AWS_REGION, AWS_DEFAULT_REGION) and EC2 instance metadata service (IMDS), consistent with auth_login_aws behavior. (#​2786)
  • provider/auth_aws: Fix auth_login_aws for Vault AWS auth backends configured with use_sts_region_from_client = true by generating a standard SigV4-signed GetCallerIdentity request with an Authorization header, and added support for custom STS endpoints. (#​2841)
  • resource_database_secret_backend_connection : Fixes a regression issue for resource_database_secret_backend_connection for elasticsearch. Reverted the field name from insecure_tls to insecure.
  • vault_rabbitmq_secret_backend_role: Fixed spurious diff issue for vhost and vhost_topic fields by changing field type from TypeList to TypeSet. (#​2872)
  • provider/auth_aws: Fix auth_login_aws to avoid an unintended second STS AssumeRole call during web identity credential flows, while preserving manual role assumption for explicitly configured or env-derived aws_role_arn values in non-web-identity setups.(#​2850)

Release Note:

  • Vault Version Support: The Vault provider will be dropping Vault version support for Vault <= 1.18.x. This means that going forward only Vault server version 1.19.x and greater will be officially tested against.

v5.8.0

Compare Source

FEATURES:

  • Add support for CF auth backend: vault_cf_auth_backend_config and vault_cf_auth_backend_role resources, and vault_cf_auth_login ephemeral resource for short-lived Vault tokens.
  • Add support for SPIFFE secrets backend: (#​2660)
  • Add support for pki-external-ca secrets backend: (#​2771)
  • Add new KMIP resources vault_kmip_secret_ca_generated, vault_kmip_secret_ca_imported, vault_kmip_secret_listener, and add support for the ca field in vault_kmip_secret_role: (#​2773)
  • vault_secrets_sync_azure_destination: Add support for Workload Identity Federation (WIF) fields identity_token_audience, identity_token_audience_wo_version, identity_token_ttl, and identity_token_key to enable token-based authentication with Azure. Requires Vault 2.0.0+. (#​2790)
  • vault_secrets_sync_aws_destination: Add support for Workload Identity Federation (WIF) fields identity_token_audience, identity_token_ttl, and identity_token_key to enable token-based authentication with AWS. Requires Vault 2.0.0+. (#​2792)
  • vault_secrets_sync_gcp_destination: Add support for Workload Identity Federation (WIF) fields identity_token_audience_wo, identity_token_audience_wo_version, identity_token_ttl, identity_token_key_wo, identity_token_key_wo_version and service_account_email to enable token-based authentication with GCP. Requires Vault 2.0.0+. (#​2798)
  • New Ephemeral Resource: Add ephemeral resource for vault_generic_secret (#​2735)
  • New Ephemeral Resource: Add ephemeral resource vault_terraform_token, by @​drewmullen (#​2616)

IMPROVEMENTS:

  • vault_managed_keys: Add support for GCP Cloud KMS managed keys with parameters: credentials, project, key_ring, region, crypto_key, crypto_key_version, and algorithm. (#​2769)
  • vault_okta_auth_backend: Add support for write-only field api_token_wo with version counters to prevent sensitive credentials from being stored in Terraform state. Deprecate organization and token and replace with org_name and api_token respectively in vault_okta_auth_backend resource. (#​2736)
  • vault_kubernetes_secret_backend_role: Add support for token_default_audiences field to configure default audiences for generated Kubernetes tokens. Requires Vault 1.15+. (#​2722)
  • vault_raft_snapshot_agent_config: Add support for azure_auth_mode and azure_client_id fields for Azure Managed Identity authentication (Vault Enterprise 1.18.0+), and autoload_enabled field for automatic snapshot restoration (Vault Enterprise 1.21.0+). (#​2758)
  • vault_ssh_secret_backend_role: Add support for fields (default_extensions_template, exclude_cidr_list, port) and improve handling of key-type-specific fields (default_extensions, default_extensions_template, exclude_cidr_list, port) to prevent drift. Fields that are not applicable to a role's key type (CA or OTP) are now conditionally set in state only when returned by Vault, preventing perpetual drift when users configure fields that Vault ignores. CA key type supports: default_extensions, default_extensions_template. OTP key type supports: port, exclude_cidr_list. (#​2747)
  • Added remove_roots_from_chain field to vault_pki_secret_backend_root_cert and resource_pki_secret_backend_sign. (#​2760)
  • vault_pki_secret_backend_root_cert: Add support for use_pss and key_usage fields to configure PSS signature scheme and X.509 key usage constraints for root CA certificates. Requires Vault 1.18.0+ and 1.19.2+ respectively. (#​2754)
  • vault_pki_secret_backend_root_sign_intermediate: Add version check for key_usage field to ensure compatibility with Vault 1.19.2+ for configuring X.509 key usage constraints on intermediate CA certificates. (#​2754)
  • provider/auth_jwt: Add support for distributed_claim_access_token field in the auth_login_jwt configuration block. (#​2782)
  • vault_database_secret: Add support for additional credential types (rsa_private_key, client_certificate, private_key, private_key_type) in the ephemeral resource to support all database credential types available in Vault's database secrets engine. (#​2767)
  • Updated dependencies:
    • github.com/Azure/azure-sdk-for-go/sdk/azcore v1.20.0 -> v1.21.0
    • github.com/aws/aws-sdk-go-v2 v1.32.5 -> v1.41.3
    • github.com/aws/aws-sdk-go-v2/service/iam v1.38.1 -> v1.53.5
    • github.com/aws/aws-sdk-go-v2/service/sts v1.33.1 -> v1.41.8
    • github.com/aws/smithy-go v1.22.1 -> v1.24.2
    • github.com/coreos/pkg v0.0.0-20230601102743-20bbbf26f4d8 -> v0.0.0-20240122114842-bbd7aa9bf6fb
    • github.com/go-viper/mapstructure/v2 v2.4.0 -> v2.5.0
    • github.com/googleapis/enterprise-certificate-proxy v0.3.12 -> v0.3.14
    • github.com/hashicorp/consul/api v1.33.0 -> v1.33.4
    • github.com/hashicorp/go-secure-stdlib/awsutil/v2 v2.1.1 -> v2.1.2
    • github.com/hashicorp/terraform-plugin-framework v1.16.1 -> v1.19.0
    • github.com/hashicorp/terraform-plugin-go v0.29.0 -> v0.31.0
    • github.com/hashicorp/terraform-plugin-mux v0.21.0 -> v0.23.0
    • github.com/hashicorp/terraform-plugin-sdk/v2 v2.38.1 -> v2.40.0
    • github.com/hashicorp/terraform-plugin-testing v1.13.3 -> v1.15.0
    • github.com/hashicorp/vault-plugin-auth-oci v0.20.0 -> v0.20.1
    • github.com/hashicorp/vault/sdk v0.22.0 -> v0.23.0
    • github.com/spiffe/go-spiffe/v2 v2.5.0 -> v2.6.0
    • golang.org/x/crypto v0.45.0 -> v0.49.0
    • golang.org/x/net v0.47.0 -> v0.52.0
    • golang.org/x/oauth2 v0.31.0 -> v0.36.0
    • golang.org/x/sync v0.19.0 -> v0.20.0
    • golang.org/x/sys v0.41.0 -> v0.42.0
    • golang.org/x/text v0.34.0 -> v0.35.0
    • golang.org/x/time v0.14.0 -> v0.15.0
    • golang.org/x/tools v0.41.0 -> v0.42.0
    • google.golang.org/api v0.251.0 -> v0.271.0
    • google.golang.org/genproto v0.0.0-20250603155806-513f23925822 -> v0.0.0-20260311181403-84a4fc48630c
    • google.golang.org/genproto/googleapis/api v0.0.0-20260128011058-8636f8732409 -> v0.0.0-20260226221140-a57be14db171
    • google.golang.org/genproto/googleapis/rpc v0.0.0-20260217215200-42d3e9bedb6d -> v0.0.0-20260226221140-a57be14db171
    • google.golang.org/grpc v1.79.1 -> v1.79.2
    • hashicorp/setup-terraform v3 -> v4
    • github.com/cloudflare/circl v1.6.1 -> v1.6.3
    • filippo.io/edwards25519 v1.1.0 -> v1.1.1
    • k8s.io/utils v0.0.0-20240102154912-e7106e64919e -> v0.0.0-20260210185600-b8788abfbbc2

BUGS:

  • Clears the bindpass field in the state file after migrating to the write-only field in vault_ldap_auth_backend resource. (#​2813)

Configuration

📅 Schedule: (UTC)

  • Branch creation
    • Only on Sunday and Saturday (* * * * 0,6)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested review from a team and Thanhphan1147 as code owners March 14, 2026 02:46
@renovate renovate Bot requested review from nrobinaubertin and srbouffard and removed request for a team March 14, 2026 02:46
@renovate renovate Bot force-pushed the renovate/vault-5.x branch from 7088143 to 4b081dd Compare March 15, 2026 18:28
@renovate renovate Bot force-pushed the renovate/vault-5.x branch from 4b081dd to 235b6aa Compare March 15, 2026 19:36
@renovate renovate Bot force-pushed the renovate/vault-5.x branch from 235b6aa to 1cd7a1c Compare March 15, 2026 20:04
@renovate renovate Bot force-pushed the renovate/vault-5.x branch from 1cd7a1c to 743d82d Compare March 20, 2026 12:51
@renovate renovate Bot force-pushed the renovate/vault-5.x branch from 743d82d to 0b02516 Compare March 20, 2026 15:46
@renovate renovate Bot force-pushed the renovate/vault-5.x branch from 0b02516 to 670b649 Compare March 30, 2026 20:44
@renovate renovate Bot force-pushed the renovate/vault-5.x branch from 670b649 to 5008f95 Compare April 3, 2026 09:51
@renovate renovate Bot changed the title chore(deps): update terraform vault to ~> 5.8.0 chore(deps): update terraform vault to ~> 5.9.0 Apr 22, 2026
@renovate renovate Bot force-pushed the renovate/vault-5.x branch from 5008f95 to f4dbb82 Compare April 22, 2026 17:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant