-
Notifications
You must be signed in to change notification settings - Fork 607
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updating the example for current software versions #325
base: master
Are you sure you want to change the base?
Conversation
* Use of Ubuntu 20.04 LTS (update from 16.04 LTS) * Either Vault OSS or Enterprise > 1.0.0 can be used * Updated vault init to "vault operator init" vs. older "vault init" * Updated output for "vault operator init" & "vault status"
Tested with v0.13.0 & v0.14.8
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement Learn more about why HashiCorp requires a CLA and what the CLA includes Kelly Hair seems not to be a GitHub user. Have you signed the CLA already but the status is still pending? Recheck it. |
I noticed that I left some commented lines in. Will clean up & resubmit. |
Updated files; reopening |
@kellyhair Could you please review and agree to CLA? |
Changes to
aws-kms-unseal-ha
:versions.tf
to required Terraform 0.13 or greater.variables.tf
.userdata.tpl
.README.md
to update the unseal instructions.Changes to
aws-kms-unseal
:versions.tf
file; set required version of Terraform to 0.13.Notes:
Tested both plans (
aws-kms-unseal
&aws-kms-unseal-ha
) with Terraform v0.13.0 and v0.14.8. Terraform v0.14.8 was the most recent as of commits & PR.