Having "password" defined with newparam, any Content of Type Sensitive will lead to "Unable to mark 'password' as sensitive: password is a parameter and not a property, and cannot be automatically redacted." In Fact "password" (as well as others) should be a Property. (compare https://puppet.com/docs/puppet/7/custom_types.html#tandp_properties_and_parameters)
Merge pull request #379 from puppetlabs/pdksync_IAC-1598/main/remove_…
…debian_8_support pdksync - (IAC-1598) - Remove Support for Debian 8
Merge pull request #378 from cocker-cc/Fix_password_as_Property
Fix "password" as Property
Merge pull request #380 from puppetlabs/pdksync_IAC-1751/main/add_roc…
…ky_8_support pdksync - (IAC-1751) - Add Support for Rocky 8
Merge pull request #381 from puppetlabs/pdksync_IAC-1752/main/add_alm…
…alinux_8_support pdksync - (IAC-1753) - Add Support for AlmaLinux 8
Merge pull request #382 from puppetlabs/honeycomb_github_secret
change the honeycomb writekey to a github secret
Merge pull request #383 from puppetlabs/sec-honeycomb-secret
move honeycomb key
Merge pull request #384 from puppetlabs/pdksync_IAC-1787/main/remove_…
…centos_6_support pdksync - (IAC-1787) Remove Support for CentOS 6
The git prefix is no longer deemed secure for our setup, swapping to https
Merge pull request #387 from puppetlabs/david22swan-patch-1
(maint) pr_test workflow fix
A temporary fix for an issue for chocolatey. Error seems to originate from a problem with the boxes(?)
Merge pull request #389 from puppetlabs/david22swan-patch-1
(GH-388) Temporary Windows Fix
Merge pull request #390 from puppetlabs/pdksync_GH-iac-334/main/remov…
…e_ubuntu_16.04_support pdksync - (GH-iac-334) Remove Support for Ubuntu 14.04/16.04
Merge pull request #391 from puppetlabs/pdksync_pdksync_add_workflows
pdksync - Add labeller and stale GHA workflows
Merge pull request #386 from puppetlabs/pdksync_pdksync_heads/main-0-…
…gf3911d3 pdksync - pdksync_heads/main-0-gf3911d3
Add support for certificate_content and private_key_content parameters
The current implementation only allows you to pass a file name to the certificate and private_key parameters. When you are fetching certificates from vault or another secure store, you'll first have to save them to a file. This is very innconveniant. This PR add's the parameters certificate_content and private_key_content. These parameters are mutually exclusive from their file counterparts. With this change, you can now fetch a certificate and/or a password from vault (through a hiera lookup for example) and use it directly on the type. Because these values can be sensitive, both of the new parameters support passing the value as a sensitive data type.
Merge pull request #385 from enterprisemodules/add_support_for_certif…
…icate_content Add support for certificate_content and private_key_content parameters
Merge pull request #395 from puppetlabs/pdksync_pdksync-use_pull_requ…
…est_target pdksync - PDKSYNC Update labeller trigger
Merge pull request #396 from david22swan/maint/release_prep
Release prep v4.3.0