Skip to content

Commit 5e6eaaa

Browse files
Release prep v3.1.1 (#104)
Co-authored-by: GitHub Action <[email protected]>
1 parent 227ad61 commit 5e6eaaa

File tree

3 files changed

+25
-9
lines changed

3 files changed

+25
-9
lines changed

CHANGELOG.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,14 @@
22

33
All notable changes to this project will be documented in this file. The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org).
44

5+
## [v3.1.1](https://github.com/tragiccode/tragiccode-azure_key_vault/tree/v3.1.1) (2023-01-15)
6+
7+
[Full Changelog](https://github.com/tragiccode/tragiccode-azure_key_vault/compare/v3.1.0...v3.1.1)
8+
9+
### Fixed
10+
11+
- \(GH-101\) Fix documentation for secret lookup using hiera data file interpolation [\#102](https://github.com/TraGicCode/tragiccode-azure_key_vault/pull/102) ([TraGicCode](https://github.com/TraGicCode))
12+
513
## [v3.1.0](https://github.com/tragiccode/tragiccode-azure_key_vault/tree/v3.1.0) (2022-09-23)
614

715
[Full Changelog](https://github.com/tragiccode/tragiccode-azure_key_vault/compare/v3.0.0...v3.1.0)

REFERENCE.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@
66

77
### Functions
88

9-
* [`azure_key_vault::lookup`](#azure_key_vaultlookup)
10-
* [`azure_key_vault::secret`](#azure_key_vaultsecret): Retrieves secrets from Azure's Key Vault.
9+
* [`azure_key_vault::lookup`](#azure_key_vault--lookup)
10+
* [`azure_key_vault::secret`](#azure_key_vault--secret): Retrieves secrets from Azure's Key Vault.
1111

1212
## Functions
1313

14-
### <a name="azure_key_vaultlookup"></a>`azure_key_vault::lookup`
14+
### <a name="azure_key_vault--lookup"></a>`azure_key_vault::lookup`
1515

1616
Type: Ruby 4.x API
1717

@@ -38,14 +38,18 @@ Data type: `Variant[String, Numeric]`
3838

3939
##### `options`
4040

41-
Data type: `Struct[{
41+
Data type:
42+
43+
```puppet
44+
Struct[{
4245
vault_name => String,
4346
vault_api_version => String,
4447
Optional[metadata_api_version] => String,
4548
confine_to_keys => Array[String],
4649
Optional[key_replacement_token] => String,
4750
Optional[service_principal_credentials] => String
48-
}]`
51+
}]
52+
```
4953

5054

5155

@@ -55,7 +59,7 @@ Data type: `Puppet::LookupContext`
5559

5660

5761

58-
### <a name="azure_key_vaultsecret"></a>`azure_key_vault::secret`
62+
### <a name="azure_key_vault--secret"></a>`azure_key_vault::secret`
5963

6064
Type: Ruby 4.x API
6165

@@ -89,15 +93,19 @@ Name of the secret to be retrieved.
8993

9094
##### `api_endpoint_hash`
9195

92-
Data type: `Struct[{
96+
Data type:
97+
98+
```puppet
99+
Struct[{
93100
vault_api_version => String,
94101
Optional[metadata_api_version] => String,
95102
Optional[service_principal_credentials] => Struct[{
96103
tenant_id => String,
97104
client_id => String,
98105
client_secret => String
99106
}]
100-
}]`
107+
}]
108+
```
101109

102110
A Hash with API endpoint and authentication information
103111

metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"name": "tragiccode-azure_key_vault",
3-
"version": "3.1.0",
3+
"version": "3.1.1",
44
"author": "tragiccode",
55
"summary": "The azure_key_vault module allows you to easily fetch secrets securely within your puppet manifests.",
66
"license": "Apache-2.0",

0 commit comments

Comments
 (0)