diff --git a/changelog/22823.txt b/changelog/22823.txt new file mode 100644 index 0000000000..fa98bf5015 --- /dev/null +++ b/changelog/22823.txt @@ -0,0 +1,3 @@ +```release-note:change +secrets/kubernetes: Update plugin to v0.6.0 +``` diff --git a/go.mod b/go.mod index a9d12dc9aa..df9b83450c 100644 --- a/go.mod +++ b/go.mod @@ -146,8 +146,8 @@ require ( github.com/hashicorp/vault-plugin-secrets-azure v0.16.3 github.com/hashicorp/vault-plugin-secrets-gcp v0.17.0 github.com/hashicorp/vault-plugin-secrets-gcpkms v0.15.1 - github.com/hashicorp/vault-plugin-secrets-kubernetes v0.5.0 github.com/hashicorp/vault-plugin-secrets-kv v0.16.1 + github.com/hashicorp/vault-plugin-secrets-kubernetes v0.6.0 github.com/hashicorp/vault-plugin-secrets-mongodbatlas v0.10.1 github.com/hashicorp/vault-plugin-secrets-openldap v0.11.2 github.com/hashicorp/vault-plugin-secrets-terraform v0.7.1 diff --git a/go.sum b/go.sum index d20abfcefd..1380a99c70 100644 --- a/go.sum +++ b/go.sum @@ -2160,10 +2160,10 @@ github.com/hashicorp/vault-plugin-secrets-gcp v0.17.0 h1:Z7IqtShXD8uDzLfKskk8rt8 github.com/hashicorp/vault-plugin-secrets-gcp v0.17.0/go.mod h1:VRSCqW/rYThWK/bmBiBKI1dKOg383xnedA/G9ghJrug= github.com/hashicorp/vault-plugin-secrets-gcpkms v0.15.1 h1:qUFOjiz5+wgZsRpOF0hCFeot9vZEyhqfJ4w/UFJAjfc= github.com/hashicorp/vault-plugin-secrets-gcpkms v0.15.1/go.mod h1:QG4LU5GIBXo1pqnfJXXwOe05PJSyhBh2p+mAq06iI8U= -github.com/hashicorp/vault-plugin-secrets-kubernetes v0.5.0 h1:g0W1ybHjO945jDtuDEFcqTINyW/s06wxZarE/7aLumc= -github.com/hashicorp/vault-plugin-secrets-kubernetes v0.5.0/go.mod h1:2wobeIypBESGQYmhv12vuAorCvfETHpBoMyrb+6QTmQ= github.com/hashicorp/vault-plugin-secrets-kv v0.16.1 h1:Giy/sj9O9BYdZbNsAkYvNmns5KikZI5RsFb4bBPFXds= github.com/hashicorp/vault-plugin-secrets-kv v0.16.1/go.mod h1:oJwVConr6pkDIIO8q8OO3FP5WtWj/iSWuhiPVdKt67E= +github.com/hashicorp/vault-plugin-secrets-kubernetes v0.6.0 h1:DePS4sSAbjYTQrpTPrqZLFMw9aFHsqqqhktBcVjhjzw= +github.com/hashicorp/vault-plugin-secrets-kubernetes v0.6.0/go.mod h1:4nPWdBQxjIEGZaWWPKHixN7MFHjESOlOtNyy02e/w9c= github.com/hashicorp/vault-plugin-secrets-mongodbatlas v0.10.1 h1:6WyystBBEx1bDpkZO99wI3RbNvhUTVR6/ihHDeZMsPw= github.com/hashicorp/vault-plugin-secrets-mongodbatlas v0.10.1/go.mod h1:OdXvez+GH0XBSRS7gxbS8B1rLUPb8bGk+bDVyEaAzI8= github.com/hashicorp/vault-plugin-secrets-openldap v0.11.2 h1:LNzIP4zfWivAy/hgCIwETJFr7BBS91bsJ6AlsGhqAc8= diff --git a/vault/seal/seal.go b/vault/seal/seal.go index 7935200a9d..4c843e3b52 100644 --- a/vault/seal/seal.go +++ b/vault/seal/seal.go @@ -291,8 +291,10 @@ func (a *access) AllSealWrappersHealthy() bool { return len(a.wrappersByPriority) == len(a.filterSealWrappers(enabledAndDisabled, healthyOnly)) } -type enabledFilter bool -type healthyFilter bool +type ( + enabledFilter bool + healthyFilter bool +) const ( enabledOnly = enabledFilter(true) diff --git a/website/content/partials/db-secrets-credential-types.mdx b/website/content/partials/db-secrets-credential-types.mdx index 733313e0a3..9caffe89e0 100644 --- a/website/content/partials/db-secrets-credential-types.mdx +++ b/website/content/partials/db-secrets-credential-types.mdx @@ -24,7 +24,7 @@ to be used for the client certificate common name. - `ca_cert` `(string: "")` - The PEM-encoded CA certificate. - `ca_private_key` `(string: "")` - The PEM-encoded private key for the given `ca_cert`. - - `key_type` `(string: ")` - Specifies the desired key type. Options include: + - `key_type` `(string: )` - Specifies the desired key type. Options include: `rsa`, `ed25519`, `ec`. - `key_bits` `(int: 2048)` - Number of bits to use for the generated keys. Options include: `2048` (default), `3072`, `4096`; with `key_type=ec`, allowed values are: `224`, `256` (default),