Skip to content

Commit dc098d3

Browse files
Prepare for v5.1.0 release (#2522)
1 parent 06210b9 commit dc098d3

File tree

7 files changed

+13
-19
lines changed

7 files changed

+13
-19
lines changed

.github/workflows/build.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,11 +63,11 @@ jobs:
6363
fail-fast: false
6464
matrix:
6565
image:
66-
- "vault-enterprise:1.15.16-ent"
6766
- "vault-enterprise:1.16.21-ent"
6867
- "vault-enterprise:1.17.17-ent"
6968
- "vault-enterprise:1.18.10-ent"
7069
- "vault-enterprise:1.19.5-ent"
70+
- "vault-enterprise:1.20.0-ent"
7171
- "vault:latest"
7272
services:
7373
vault:

.go-version

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.23.3
1+
1.24.4

CHANGELOG.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
## Unreleased
22

3+
## 5.1.0 (Jul 9, 2025)
4+
35
FEATURES:
46
* Add support for key_usage to `vault_pki_secret_backend_root_sign_intermediate` ([#2421])(https://github.com/hashicorp/terraform-provider-vault/pull/2421)
57

6-
* Add private_key_wo and private_key_wo_version fields to Snowflake DB secrets engine config ([#2508])(https://github.com/hashicorp/terraform-provider-vault/pull/2508)
8+
* Add `private_key_wo` and `private_key_wo_version` fields to Snowflake DB secrets engine config ([#2508])(https://github.com/hashicorp/terraform-provider-vault/pull/2508)
79

810
* Add support for `group_by` and `secondary_rate` on resource `vault_quota_rate_limit`. Requires Vault Enterprise 1.20.0+ ([#2476](https://github.com/hashicorp/terraform-provider-vault/pull/2476))
911
* Add support for Transit CMAC endpoint ([#2488](https://github.com/hashicorp/terraform-provider-vault/pull/2488))

go.mod

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
module github.com/hashicorp/terraform-provider-vault
22

3-
go 1.23.3
4-
5-
toolchain go1.23.4
3+
go 1.24.3
64

75
require (
86
cloud.google.com/go/compute/metadata v0.6.0

internal/framework/model/model.go

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,18 +13,12 @@ import (
1313
func ToAPIModel(data, model any) error {
1414
jsonData, err := json.Marshal(data)
1515
if err != nil {
16-
return fmt.Errorf(
17-
"An unexpected error occurred while attempting to marshal the Vault response.\n\n" +
18-
"Error: " + err.Error(),
19-
)
16+
return fmt.Errorf("an unexpected error occurred while attempting to marshal the Vault response.\n\nError: %w", err)
2017
}
2118

2219
err = json.Unmarshal(jsonData, &model)
2320
if err != nil {
24-
return fmt.Errorf(
25-
"An unexpected error occurred while attempting to unmarshal the data.\n\n" +
26-
"Error: " + err.Error(),
27-
)
21+
return fmt.Errorf("an unexpected error occurred while attempting to unmarshal the data.\n\nError: %w", err)
2822
}
2923
return nil
3024
}

vault/data_source_kv_secret_v2_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ func TestDataSourceKVV2Secret_deletedSecret(t *testing.T) {
8080
Description: "Mount for testing KV datasource",
8181
})
8282
if err != nil {
83-
t.Fatalf(fmt.Sprintf("error mounting kvv2 engine; err=%s", err))
83+
t.Fatalf("error mounting kvv2 engine; err=%s", err)
8484
}
8585

8686
m := map[string]interface{}{
@@ -96,7 +96,7 @@ func TestDataSourceKVV2Secret_deletedSecret(t *testing.T) {
9696
path := fmt.Sprintf("%s/data/%s", mount, name)
9797
resp, err := client.Logical().Write(path, data)
9898
if err != nil {
99-
t.Fatalf(fmt.Sprintf("error writing to Vault; err=%s", err))
99+
t.Fatalf("error writing to Vault; err=%s", err)
100100
}
101101

102102
if resp == nil {

vault/resource_kv_secret_v2_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -322,7 +322,7 @@ func readKVData(t *testing.T, mount, name string) {
322322
path := fmt.Sprintf("%s/data/%s", mount, name)
323323
resp, err := client.Logical().Read(path)
324324
if err != nil {
325-
t.Fatalf(fmt.Sprintf("error reading from Vault; err=%s", err))
325+
t.Fatalf("error reading from Vault; err=%s", err)
326326
}
327327

328328
if resp == nil {
@@ -372,7 +372,7 @@ func writeKVData(t *testing.T, mount, name string) {
372372
path := fmt.Sprintf("%s/data/%s", mount, name)
373373
resp, err := client.Logical().Write(path, data)
374374
if err != nil {
375-
t.Fatalf(fmt.Sprintf("error writing to Vault; err=%s", err))
375+
t.Fatalf("error writing to Vault; err=%s", err)
376376
}
377377

378378
if resp == nil {
@@ -389,7 +389,7 @@ func mountKVEngine(t *testing.T, mount, name string) {
389389
Description: "Mount for testing KV datasource",
390390
})
391391
if err != nil {
392-
t.Fatalf(fmt.Sprintf("error mounting kvv2 engine; err=%s", err))
392+
t.Fatalf("error mounting kvv2 engine; err=%s", err)
393393
}
394394
}
395395

0 commit comments

Comments
 (0)