Releases: hashicorp/terraform-provider-tls
v4.0.6
v4.0.5
v4.0.4
v4.0.3
BUG FIXES:
- resource/tls_locally_signed_cert: Prevented
Config Read Error
with Terraform version 1.3.0 and later - resource/tls_self_signed_cert: Prevented
Config Read Error
with Terraform version 1.3.0 and later
v4.0.2
BUG FIXES:
v4.0.1
v4.0.0
NOTES:
-
Provider has been re-written using the new
terraform-plugin-framework
(#215). -
resource/tls_cert_request:
private_key_pem
attribute is now stored in the state as-is; first apply may result in an update-in-place (#87, #215). -
resource/tls_self_signed_cert:
private_key_pem
attribute is now stored in the state as-is; first apply may result in an update-in-place (#87, #215). -
resource/tls_locally_signed_cert:
cert_request_pem
,ca_private_key_pem
andca_cert_pem
attributes are now stored in the state as-is; first apply may result in an update-in-place (#87, #215). -
resource/tls_private_key:
private_key_pem_pkcs8
,private_key_openssh
andpublic_key_fingerprint_sha256
attributes are now retro-fitted, depending on version being updated; first apply may result in an update-in-place (#210, #225)).
ENHANCEMENTS:
BREAKING CHANGES:
-
resource/tls_cert_request: Attribute
key_algorithm
is now read-only, as it's inferred fromprivate_key_pem
(#174, #215). -
resource/tls_self_signed_cert: Attribute
private_key_pem
is stored (and returned) as-is (in accordance with guidelines) (#87, #215). -
resource/tls_self_signed_cert: Attribute
key_algorithm
is now read-only, as it's inferred fromprivate_key_pem
(#174, #215). -
resource/tls_self_signed_cert: Setting an unsupported value in
allowed_uses
attribute, will now return an error instead of just a warning (#185, #215). -
resource/tls_self_signed_cert: Attribute
private_key_pem
is stored (and returned) as-is (in accordance with guidelines) (#87, #215). -
resource/tls_locally_signed_cert: Attribute
ca_key_algorithm
is now read-only, as it's inferred fromca_private_key_pem
(#174, #215). -
resource/tls_locally_signed_cert: Setting an unsupported value in
allowed_uses
attribute, will now return an error instead of just a warning (#185, #215). -
resource/tls_locally_signed_cert: Attributes
cert_request_pem
,ca_private_key_pem
,ca_cert_pem
are stored (and returned) as-is (in accordance with guidelines) (#87, #215). -
provider: Default value for
proxy.from_env
is nowtrue
, and relies uponhttpproxy.FromEnvironment
(#224).
v3.4.0
NEW FEATURES:
-
data-source/tls_certificate: New attribute
content
that can be used in alternative tourl
, to provide the certificate in PEM format (#189). -
data-source/tls_certificate: Objects in the
certificates
chain attribute expose a new attributecert_pem
(PEM format) (#208). -
resource/tls_self_signed_cert: New attribute
set_authority_key_id
to make the generated certificate include an authority key identifier (#212).
ENHANCEMENTS:
- resource/tls_locally_signed_cert: If CA provided via
ca_cert_pem
is not an actual CA, a warning will be raised, but the certificate will still be created (#209).
NOTES:
- data-source/tls_certificate: The
id
attribute has changed to the hashing of all certificates information in the chain. The first apply of this updated data source may show this difference (#189).
BUG FIXES:
v3.3.0
NEW FEATURES:
-
provider: Added (opt-in) HTTP
proxy
configuration (#179). -
data-source/tls_certificate: Support for
tls://
scheme inurl
argument. When used, the provider will fetch certificates via a direct Secure Socket (i.e. ignores proxy) (#179).
ENHANCEMENTS:
-
data-source/tls_certificate: When
proxy
is configured on provider, certificates fetched viaurl
with schemehttps://
will go through the specified HTTP proxy (#179). -
resource/tls_locally_signed_cert: Validate
allowed_uses
contains documented values, but raise warning instead of error when it does not (#184).
v3.2.1
BUG FIXES:
-
resource/tls_locally_signed_cert: Fix issue preventing the generation of subject key identifier for private keys using ED25519 (#182)
-
resource/tls_self_signed_cert: Fix issue preventing the generation of subject key identifier for private keys using ED25519 (#182)