This document will give you help on upgrading major versions of hashicorp_vault
Version 6.0.0 is a refactoring of the configuration resources to use load_current_value
and converge_if_changed
to support full resource notifications and reporting.
Several breaking changes have been introduced to support this:
-
The
type
property is now required to be set to allow retrieval byload_current_value
and will be used to generate the configuration template -
The
vault_mode
property must be configured for HCL items that are used for both server and agent configuration- Default to :server for items that apply to both server and agent mode
- Default to :agent for items that apply only to agent mode
-
Agent only configuration resources (auto_auth, template) now require identifying properties to be specified external to the
config
Hashauto_auth
- The
entry_type
property is added and must be set to either:method
or:sink
to identify which configuration sub-type to generate - The
path
property is set and merged into the config hash upon template generation (for:sink
types only)
- The
template
- The:destination
property is set and merged into the config hash upon template generation
- Unless overridden, server mode configuration items are now generated as individual files within the vault configuration directory
- Allow simple loading of the current value
- Agent mode generates an accumulated template as per v5.0.0.
Version 5.0.0 is a major rewrite of the cookbook to current standards.
- Remodel fully as a resource library cookbook.
- Unified configuration resources, the same resources are to be used for both server and agent configuration.
- All attributes
- Resource
hashicorp_vault_install_dist
- Resource
hashicorp_vault_agent_config
- Resource
hashicorp_vault_agent_install
- Resource
hashicorp_vault_agent_template
- HCL configuration support
hashicorp_vault_config_auto_auth
- Documentationhashicorp_vault_config_entropy
- Documentationhashicorp_vault_config_global
- Documentationhashicorp_vault_config_listener
- Documentationhashicorp_vault_config_seal
- Documentationhashicorp_vault_config_service_registration
- Documentationhashicorp_vault_config_storage
- Documentationhashicorp_vault_config_template
- Documentation
hashicorp_vault_config_global
should always be used to add the base configuration settings for a vault configuration- The compilation and convergence of any of the
hashicorp_vault_config_*
resources will result in the instantiation of the accumulated template to the create the HCL configuration file - Due to the above it is possible to create a configuration file elements missing that are required for vault operation, see the vault documentation for details on which configuration items and thus resources you will require.
- Custom resources have been rewritten in current style.
- Vault configuration items that were previously represented as individual Chef resource properties have been moved to a single
options
Hash property. - Unified configuration resources - the same resources are used for both
server
andagent
mode.
- The
hashicorp_vault_install
resource is no longer an AIO resource and will not configure vault nor create the service. - Previous use of the install resource should be migrated to a wrapper recipe with install, configuration and service management implemented by the user.
- The
hashicorp_vault_config
resource should be implemented for users who wish to continue using Vault withjson
configuration format. - All resource properties and values should be migrated to the
config
Hash property.
- Vault can be configured in
agent
mode with ajson
configuration by the use ofhashicorp_vault_config
, with theconfig_file
property overridden if server and agent mode are to co-exist. - The vault agent service can be managed via
hashicorp_vault_service
with themode
property set to:agent
.