This repository was archived by the owner on Oct 9, 2024. It is now read-only.
chore(deps): update dependency hashicorp/vault to v1.17.6#34
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update dependency hashicorp/vault to v1.17.6#34renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
b4066e5 to
140d4c5
Compare
140d4c5 to
c45995e
Compare
c45995e to
519eacc
Compare
519eacc to
7f55af0
Compare
7f55af0 to
68bf90f
Compare
68bf90f to
06cc106
Compare
06cc106 to
8ef3014
Compare
8ef3014 to
daaa708
Compare
daaa708 to
fd8bae6
Compare
fd8bae6 to
ee776fe
Compare
ee776fe to
864571b
Compare
864571b to
c7a1f4f
Compare
6aa4e7f to
f16c795
Compare
f16c795 to
efb44c4
Compare
efb44c4 to
c9470d3
Compare
c9470d3 to
2f9fd96
Compare
2f9fd96 to
75e52af
Compare
75e52af to
bd9b93f
Compare
bd9b93f to
40e985f
Compare
40e985f to
0dbd31b
Compare
0dbd31b to
2a3b2f7
Compare
2a3b2f7 to
0cc41be
Compare
0cc41be to
c068523
Compare
c068523 to
067964c
Compare
067964c to
7bbc31d
Compare
7bbc31d to
95a47da
Compare
95a47da to
370e6bb
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.12.2->v1.17.6v1.18.0Release Notes
hashicorp/vault (hashicorp/vault)
v1.17.6Compare Source
1.17.6
September 25, 2024
CHANGES:
allow_empty_principalsto allow keys or certs to apply to any user/principal. [GH-28466]IMPROVEMENTS:
current_billing_periodfrom dashboard activity log request [GH-27559]BUG FIXES:
app_nameandinstallation_idare setv1.17.5Compare Source
1.17.5
August 30, 2024
SECURITY:
core/audit: fix regression where client tokens and token accessors were being
displayed in the audit log in plaintext HCSEC-2024-18
BUG FIXES:
v1.17.4Compare Source
1.17.4
August 29, 2024
CHANGES:
IMPROVEMENTS:
visibly sensible totals. [GH-27547]
/sys/internal/counters/activitywill now include a warning if the specified usage period contains estimated client counts. [GH-28068]vault operator usagewill now include a warning if the specified usage period contains estimated client counts. [GH-28068]BUG FIXES:
vault secrets moveandvault auth movecommand will no longer attempt to write to storage on performance standby nodes. [GH-28059]v1.17.3Compare Source
1.17.3
August 07, 2024
CHANGES:
IMPROVEMENTS:
log before returning (if there are errors to log, and the context is done). [GH-27859]
eviction, and avoid duplicate loading during multiple simultaneous logins on
the same role. [GH-27902]
BUG FIXES:
sys/internal/ui/mountsfor a mount prefixed by a namespace path when path filters are configured. [GH-27939]allow_forwarding_via_headerto be configured on the cluster. [GH-27891]use versioned plugins. [GH-27881]
v1.17.2Compare Source
1.17.2
July 10, 2024
CHANGES:
FEATURES:
session tags when generating temporary credentials using the AWS secrets
engine. [GH-27620]
BUG FIXES:
vault hcp connectwhere HCP resources with uppercase letters were inaccessible when entering the correct project name. [GH-27694]proxy_protocol_behaviorwithdeny_unauthorized,which causes the Vault TCP listener to close after receiving an untrusted upstream proxy connection. [GH-27589]
v1.17.1Compare Source
1.17.1
June 26, 2024
CHANGES:
IMPROVEMENTS:
BUG FIXES:
setting of 'deny_unauthorized' [GH-27459]
is cancelled and will now use a new context with a 5 second timeout.
If the existing context is cancelled a new context, will be used. [GH-27531]
v1.17.0Compare Source
1.17.0
June 12, 2024
CHANGES:
are present in the incoming request. By default they are not HMAC'ed (but can be configured to HMAC by Vault Operators). [GH-26777]
enable_multisealin configuration.exceeded the number of uses, or is a bogus value [GH-25953]
namespacelabel on thevault.kmse.key.countmetric.FEATURES:
for write requests as a Beta feature (disabled by default). This automatically
prevents overloads caused by too many write requests while maintaining optimal
throughput for the hardware configuration and workload.
IMPROVEMENTS:
lease_renewal_threshold, that controls the refresh rate of non-renewable leases in Agent's template engine. [GH-25212]apimodule. [GH-25744]files using SIGUSR2. Added CPU profile support. [GH-25391]
static_secret_token_capability_refresh_behavior, to control the behavior when the capability refresh request receives an error from Vault.or is an otherwise invalid value. [GH-26307]
and namespace table paths in storage to allow increased mount table size without
allowing other user storage entries to become larger. [GH-25992]
sys/internal/ui/mountsendpoint for auth mount configuration view [GH-26663]password_hashfield. [GH-26577]DEPRECATIONS:
superseded by Adaptive Overload Protection and will be removed.
BUG FIXES:
vault.namespaceno longer gets incorrectly overridden byauto_auth.namespace, if set [GH-26427]/sys/config/auditing)will now force invalidation and be reloaded from storage when data is replicated
to other nodes.
HOME was not set. [GH-26243]
If the existing context deadline occurs later than 5s in the future, it will be used, otherwise a
new context, separate from the original will be used. [GH-26616]
administrative_namespace_pathconfig will now be canonicalized.redact_versionlistener parameter being ignored for some OpenAPI related endpoints. [GH-26607]chroot_namespaceis active, Vault will no longer report that the configuration is invalid when Vault is sealeded25519keys [GH-27093]autopilot to fail to discover new server versions and so not trigger an upgrade. [GH-27277]
v1.16.3Compare Source
1.16.3
May 30, 2024
CHANGES:
IMPROVEMENTS:
BUG FIXES:
If the existing context deadline occurs later than 5s in the future, it will be used, otherwise a
new context, separate from the original will be used. [GH-26616]
redact_versionlistener parameter being ignored for some OpenAPI related endpoints. [GH-26607]ed25519keys [GH-27093]v1.16.2Compare Source
v1.16.1Compare Source
1.16.1
April 04, 2024
Please note that Vault 1.16.1 is the first Enterprise release of the Vault Enterprise 1.16 series.
BUG FIXES:
v1.16.0Compare Source
1.16.0
March 26, 2024
SECURITY:
client certificates to prevent trusting certs with the same serial number
but not the same public/private key. [GH-25649]
CHANGES:
enterpriseparameter to the/sys/healthendpoint [GH-24270]vault plugin reloadwith-pluginin the root namespace will now reload the plugin across all namespaces instead of just the root namespace. [GH-24878]vault plugin infoandvault plugin deregisternow require 2 positional arguments instead of accepting either 1 or 2. [GH-24250]enable_multisealin configuration.vault://{vault node}[GH-24201]/identity/entity/mergeendpointare now always forwarded from standbys to the active node. [GH-24325]
database/config/:namewill now return a computedrunning_plugin_versionfield if a non-builtin version is running. [GH-25105]Use the environment variable
VAULT_PLUGIN_USE_LEGACY_ENV_LAYERING=trueto opt out and keep higher preference for system environmentvariables. When this flag is set, Vault will check during unseal for conflicts and print warnings for any plugins with environment
variables that conflict with system environment variables. [GH-25128]
/sys/plugins/runtimes/catalogresponse will always include a list of "runtimes" in the response, even if empty. [GH-24864]This includes github.com/docker/docker to v24.0.7+incompatible,
google.golang.org/grpc to v1.57.2 and golang.org/x/net to v0.17.0. [GH-23913]
FEATURES:
new installs of Vault. [GH-24382]
utilization reporting, which allows users to create manual exports of product-license [metering
data] to report to Hashicorp.
be changed without shutting down vault [GH-23571]
write-based HTTP methods and special-case
pki/issuerequests to preventoverloading the Vault server. [GH-25093]
IMPROVEMENTS:
tls-server-namearg for plugin registration [GH-23549]mount_type, returning mount information (e.g.kvfor KVV1/KVV2) for mount when appropriate. [GH-23047]the last heartbeat took, and the estimated clock skew between standby and
active node based on that heartbeat duration. [GH-24343]
auth/ldap: deprecates
connection_timeoutin favor ofrequest_timeoutfor timeoutssdk/ldaputil: deprecates Client in favor of cap/ldap.Client [GH-22185]
authenticate_from_environmentvariable to "true" and "false" string literals, too. [GH-22996]either provided arguments or retrieved HCP token through browser login.
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.