Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency hvac to v2 #21

Closed
wants to merge 1 commit into from

Conversation

redhat-qe-bot
Copy link
Collaborator

@redhat-qe-bot redhat-qe-bot commented Oct 20, 2023

This PR contains the following updates:

Package Type Update Change
hvac dependencies major 1.1.1 -> 2.0.0

Release Notes

hvac/hvac (hvac)

v2.0.0

Compare Source

This release makes a number of breaking changes. Most notably, dropping support for Python 3.6 & 3.7, dropping support for Vault versions 1.6.x through 1.10.x, and removing previously deprecated methods and code paths. Most of the other breaking changes are fairly minor or only affect specific use cases, but please review all changes carefully.

There are also several other deprecations and announcements to be aware of. We hope to have a more rapid release schedule going forward.

In accordance with our supported Python version policy we will continue to drop Python versions as they become end-of-life. These may not be announced in advance, but will be done in major versions.

💥 Breaking Changes
  • Client.write method breaking changes 2.0.0 (GH-1089)
  • Drop support for Vault 1.6-1.10 (GH-1074)
  • Changing default values for sys.initialize parameters secret_shares and secret_threshold (GH-1063)
  • Remove old deprecated client attributes (GH-1062)
  • Remove MFA class (GH-1056)
  • adapters: if session is user-supplied, do not overwrite session options with Client/Adapter options (GH-1021)
  • Make pyhcl optional again (GH-1060)
  • Drop Python 3.6 & 3.7, Add Python 3.11, bump some dependencies (GH-1048)
📢 Deprecations / Announcements
  • Breaking changes coming to Adapters' use of custom sessions (GH-1040)
  • Breaking changes coming to Client.write method (GH-1034)
  • The default value of raise_on_deleted_version will change from True to False in v3.0.0 (GH-955)
  • The certificate parameter for create_ca_certificate_role will stop accepting file paths in v3.0.0 (GH-914)
  • Drop support for Vault 1.6-1.10 (GH-1074)
  • Changing default values for sys.initialize parameters secret_shares and secret_threshold (GH-1063)
  • Fix typo in safety_buffer argument in AWS auth (GH-1068)
🚀 Features
  • Add support for Python 3.12 (GH-1073)
  • Database Secrets Engine - add rotate_static_credentials method, docs updates, unit tests (GH-1069)
  • Make plaintext and ciphertext optional for batch operations (GH-1049)
🐛 Bug Fixes
  • Changing default values for sys.initialize parameters secret_shares and secret_threshold (GH-1063)
  • adapters: if session is user-supplied, do not overwrite session options with Client/Adapter options (GH-1021)
📚 Documentation
  • update docstring for sys step-down (GH-1086)
  • Database Secrets Engine - add rotate_static_credentials method, docs updates, unit tests (GH-1069)
  • Fix invalid build and test status (GH-1072)
🧰 Miscellaneous
  • add .git-blame-ignore-revs (GH-1087)
  • Fix typos, add typos linter to CI (GH-1057)
  • drop python-jwt dev dependency (GH-1084)

v1.2.1

Compare Source

This release fixes an inaccuracy in a warning message but does not otherwise change functionality.

🐛 Bug Fixes
  • Fix raise_on_deleted_version warning (GH-1045)

v1.2.0

Compare Source

This is the last expected release before v2.0.0.

📢 Deprecations / Announcements
  • ldap auth method - add missing configure params by vault api names (GH-975)
  • expand Vault CI matrix, announce deprecation of Vault dynamic SSH keys (GH-1023)
  • Breaking changes coming to Client.write method (GH-1034)
  • Support for Python 3.6 & 3.7 will be dropped in v2.0.0 (GH-877)
  • Support for the Legacy MFA methods will be dropped from the MFA class in v2.0.0 (GH-1026)
  • Breaking changes coming to Adapters' use of custom sessions (GH-1040)
🚀 Features
  • Add alias_name_source for Kubernetes Auth create_role (GH-1039)
  • add Client.write_data method (GH-1028)
  • ldap auth method - add missing configure params by vault api names (GH-975)
  • Re-add arguments to create_or_update_role() from old API (GH-842)
  • Add new argument (conflicting_alias_ids_to_keep) to merge_entities method (GH-968)
  • Add impersonated account support to GCP secrets engine (GH-1022)
  • support "user_claim_json_pointer" in create_role() for JWT/OIDC auth method (GH-1006)
  • Add static account support to GCP secrets engine (GH-956)
  • adding batch_input to transit.sign_data #​988 (GH-990)
  • Add a method to read static roles in the database engine (GH-1009)
  • feat: add support for disable_local_ca_jwt in the Kubernetes auth method (GH-997)
🐛 Bug Fixes
  • add Client.write_data method (GH-1028)
  • Fix premature read on stream requests in the sys.take_raft_snapshot method (GH-771)
  • fix(__getattr__): non-existent attribute lookup (GH-982)
📚 Documentation
  • docs(secrets-engines): Add database secrets engine docs (GH-1036)
  • docs: make OIDC Authorization URL Request example work again. (GH-1010)
🧰 Miscellaneous
  • add tests and docs to sdist, improve build testing (GH-1015)
  • Bump certifi from 2022.9.14 to 2022.12.7 (GH-1013)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@redhat-qe-bot redhat-qe-bot force-pushed the renovate/hvac-2.x-lockfile branch from 5f9ba11 to ddbc3f4 Compare October 22, 2023 09:46
@redhat-qe-bot
Copy link
Collaborator Author

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

Warning: custom changes will be lost.

@myakove myakove closed this Dec 3, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants