Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update module github.com/hashicorp/vault/api to v1.15.0 #28

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Oct 12, 2023

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/hashicorp/vault/api v1.9.1 -> v1.15.0 age adoption passing confidence

Release Notes

hashicorp/vault (github.com/hashicorp/vault/api)

v1.15.0

Compare Source

1.15.0

September 27, 2023

SECURITY:

  • secrets/transit: fix a regression that was honoring nonces provided in non-convergent modes during encryption. [GH-22852]

CHANGES:

  • auth/alicloud: Update plugin to v0.16.0 [GH-22646]
  • auth/azure: Update plugin to v0.16.0 [GH-22277]
  • auth/azure: Update plugin to v0.16.1 [GH-22795]
  • auth/azure: Update plugin to v0.16.2 [GH-23060]
  • auth/cf: Update plugin to v0.15.1 [GH-22758]
  • auth/gcp: Update plugin to v0.16.1 [GH-22612]
  • auth/jwt: Update plugin to v0.17.0 [GH-22678]
  • auth/kerberos: Update plugin to v0.10.1 [GH-22797]
  • auth/kubernetes: Update plugin to v0.17.0 [GH-22709]
  • auth/kubernetes: Update plugin to v0.17.1 [GH-22879]
  • auth/ldap: Normalize HTTP response codes when invalid credentials are provided [GH-21282]
  • auth/oci: Update plugin to v0.14.2 [GH-22805]
  • core (enterprise): Ensure Role Governing Policies are only applied down the namespace hierarchy
  • core/namespace (enterprise): Introduce the concept of high-privilege namespace (administrative namespace),
    which will have access to some system backend paths that were previously only accessible in the root namespace. [GH-21215]
  • core: Bump Go version to 1.21.1.
  • database/couchbase: Update plugin to v0.9.3 [GH-22854]
  • database/couchbase: Update plugin to v0.9.4 [GH-22871]
  • database/elasticsearch: Update plugin to v0.13.3 [GH-22696]
  • database/mongodbatlas: Update plugin to v0.10.1 [GH-22655]
  • database/redis-elasticache: Update plugin to v0.2.2 [GH-22584]
  • database/redis-elasticache: Update plugin to v0.2.3 [GH-22598]
  • database/redis: Update plugin to v0.2.2 [GH-22654]
  • database/snowflake: Update plugin to v0.9.0 [GH-22516]
  • events: Log level for processing an event dropped from info to debug. [GH-22997]
  • events: data_path will include full data path of secret, including name. [GH-22487]
  • replication (enterprise): Switch to non-deprecated gRPC field for resolver target host
  • sdk/logical/events: EventSender interface method is now SendEvent instead of Send. [GH-22487]
  • secrets/ad: Update plugin to v0.16.1 [GH-22856]
  • secrets/alicloud: Update plugin to v0.15.1 [GH-22533]
  • secrets/azure: Update plugin to v0.16.2 [GH-22799]
  • secrets/azure: Update plugin to v0.16.3 [GH-22824]
  • secrets/gcp: Update plugin to v0.17.0 [GH-22746]
  • secrets/gcpkms: Update plugin to v0.15.1 [GH-22757]
  • secrets/keymgmt: Update plugin to v0.9.3
  • secrets/kubernetes: Update plugin to v0.6.0 [GH-22823]
  • secrets/kv: Update plugin to v0.16.1 [GH-22716]
  • secrets/mongodbatlas: Update plugin to v0.10.1 [GH-22748]
  • secrets/openldap: Update plugin to v0.11.2 [GH-22734]
  • secrets/terraform: Update plugin to v0.7.3 [GH-22907]
  • secrets/transform (enterprise): Enforce a transformation role's max_ttl setting on encode requests, a warning will be returned if max_ttl was applied.
  • storage/aerospike: Aerospike storage shouldn't be used on 32-bit architectures and is now unsupported on them. [GH-20825]
  • telemetry: Replace vault.rollback.attempt.{MOUNT_POINT} and vault.route.rollback.{MOUNT_POINT} metrics with vault.rollback.attempt and vault.route.rollback metrics by default. Added a telemetry configuration add_mount_point_rollback_metrics which, when set to true, causes vault to emit the metrics with mount points in their names. [GH-22400]

FEATURES:

  • Certificate Issuance External Policy Service (CIEPS) (enterprise): Allow highly-customizable operator control of certificate validation and generation through the PKI Secrets Engine.
  • Copyable KV v2 paths in UI: KV v2 secret paths are copyable for use in CLI commands or API calls [GH-22551]
  • Dashboard UI: Dashboard is now available in the UI as the new landing page. [GH-21057]
  • Database Static Role Advanced TTL Management: Adds the ability to rotate
  • Event System: Add subscribe capability and subscribe_event_types to policies for events. [GH-22474]
    static roles on a defined schedule. [GH-22484]
  • GCP IAM Support: Adds support for IAM-based authentication to MySQL and PostgreSQL backends using Google Cloud SQL. [GH-22445]
  • Improved KV V2 UI: Updated and restructured secret engine for KV (version 2 only) [GH-22559]
  • Merkle Tree Corruption Detection (enterprise): Add a new endpoint to check merkle tree corruption.
  • Plugin Containers: Vault supports registering, managing, and running plugins inside a container on Linux. [GH-22712]
  • SAML Auth Method (enterprise): Enable users to authenticate with Vault using their identity in a SAML Identity Provider.
  • Seal High Availability Beta (enterprise): operators can try out configuring more than one automatic seal for resilience against seal provider outages. Not for production use at this time.
  • Secrets Sync (enterprise): Add the ability to synchronize KVv2 secret with external secrets manager solutions.
  • UI LDAP secrets engine: Add LDAP secrets engine to the UI. [GH-20790]

IMPROVEMENTS:

  • Bump github.com/hashicorp/go-plugin version v1.4.9 -> v1.4.10 [GH-20966]
  • api: add support for cloning a Client's tls.Config. [GH-21424]
  • api: adding a new api sys method for replication status [GH-20995]
  • audit: add core audit events experiment [GH-21628]
  • auth/aws: Added support for signed GET requests for authenticating to vault using the aws iam method. [GH-10961]
  • auth/azure: Add support for azure workload identity authentication (see issue
    #​18257). Update go-kms-wrapping dependency to include PR
    #​155
    [GH-22994]
  • auth/azure: Added Azure API configurable retry options [GH-23059]
  • auth/cert: Adds support for requiring hexadecimal-encoded non-string certificate extension values [GH-21830]
  • auth/ldap: improved login speed by adding concurrency to LDAP token group searches [GH-22659]
  • auto-auth/azure: Added Azure Workload Identity Federation support to auto-auth (for Vault Agent and Vault Proxy). [GH-22264]
  • auto-auth: added support for LDAP auto-auth [GH-21641]
  • aws/auth: Adds a new config field use_sts_region_from_client which allows for using dynamic regional sts endpoints based on Authorization header when using IAM-based authentication. [GH-21960]
  • command/server: add -dev-tls-san flag to configure subject alternative names for the certificate generated when using -dev-tls. [GH-22657]
  • core (ent) : Add field that allows lease-count namespace quotas to be inherited by child namespaces.
  • core : Add field that allows rate-limit namespace quotas to be inherited by child namespaces. [GH-22452]
  • core/fips: Add RPM, DEB packages of FIPS 140-2 and HSM+FIPS 140-2 Vault Enterprise.
  • core/quotas: Add configuration to allow skipping of expensive role calculations [GH-22651]
  • core: Add a new periodic metric to track the number of available policies, vault.policy.configured.count. [GH-21010]
  • core: Fix OpenAPI representation and -output-policy recognition of some non-standard sudo paths [GH-21772]
  • core: Fix regexes for sys/raw/ and sys/leases/lookup/ to match prevailing conventions [GH-21760]
  • core: Log rollback manager failures during unmount, remount to prevent replication failures on secondary clusters. [GH-22235]
  • core: Use a worker pool for the rollback manager. Add new metrics for the rollback manager to track the queued tasks. [GH-22567]
  • core: add a listener configuration "chroot_namespace" that forces requests to use a namespace hierarchy [GH-22304]
  • core: add a listener configuration "chroot_namespace" that forces requests to use a namespace hierarchy
  • core: remove unnecessary *BarrierView field from backendEntry struct [GH-20933]
  • core: use Go stdlib functionalities instead of explicit byte/string conversions [GH-21854]
  • docs: Clarify when a entity is created [GH-22233]
  • eventbus: updated go-eventlogger library to allow removal of nodes referenced by pipelines (used for subscriptions) [GH-21623]
  • events: Allow subscriptions to multiple namespaces [GH-22540]
  • events: Enabled by default [GH-22815]
  • events: WebSocket subscriptions add support for boolean filter expressions [GH-22835]
  • framework: Make it an error for CreateOperation to be defined without an ExistenceCheck, thereby fixing misleading x-vault-createSupported in OpenAPI [GH-18492]
  • kmip (enterprise): Add namespace lock and unlock support [GH-21925]
  • openapi: Better mount points for kv-v1 and kv-v2 in openapi.json [GH-21563]
  • openapi: Fix generated types for duration strings [GH-20841]
  • openapi: Fix generation of correct fields in some rarer cases [GH-21942]
  • openapi: Fix response definitions for list operations [GH-21934]
  • openapi: List operations are now given first-class representation in the OpenAPI document, rather than sometimes being overlaid with a read operation at the same path [GH-21723]
  • plugins: Containerized plugins can be configured to still work when running with systemd's PrivateTmp=true setting. [GH-23215]
  • replication (enterprise): Avoid logging warning if request is forwarded from a performance standby and not a performance secondary
  • replication (enterprise): Make reindex less disruptive by allowing writes during the flush phase.
  • sdk/framework: Adds replication state helper for backends to check for read-only storage [GH-21743]
  • secrets/database: Improves error logging for static role rotations by including the database and role names. [GH-22253]
  • secrets/db: Remove the service_account_json parameter when reading DB connection details [GH-23256]
  • secrets/pki: Add a parameter to allow ExtKeyUsage field usage from a role within ACME. [GH-21702]
  • secrets/transform (enterprise): Switch to pgx PostgreSQL driver for better timeout handling
  • secrets/transit: Add support to create CSRs from keys in transit engine and import/export x509 certificates [GH-21081]
  • storage/dynamodb: Added three permit pool metrics for the DynamoDB backend, pending_permits, active_permits, and pool_size. [GH-21742]
  • storage/etcd: Make etcd parameter MaxCallSendMsgSize configurable [GH-12666]
  • storage/raft: Cap the minimum dead_server_last_contact_threshold to 1m. [GH-22040]
  • sys/metrics (enterprise): Adds a gauge metric that tracks whether enterprise builtin secret plugins are enabled. [GH-21681]
  • ui: Add API Explorer link to Sidebar, under Tools. [GH-21578]
  • ui: Add pagination to PKI roles, keys, issuers, and certificates list pages [GH-23193]
  • ui: Added allowed_domains_template field for CA type role in SSH engine [GH-23119]
  • ui: Adds mount configuration details to Kubernetes secrets engine configuration view [GH-22926]
  • ui: Adds tidy_revoked_certs to PKI tidy status page [GH-23232]
  • ui: Adds warning before downloading KV v2 secret values [GH-23260]
  • ui: Display minus icon for empty MaskedInput value. Show MaskedInput for KV secrets without values [GH-22039]
  • ui: JSON diff view available in "Create New Version" form for KV v2 [GH-22593]
  • ui: KV View Secret card will link to list view if input ends in "/" [GH-22502]
  • ui: Move access to KV V2 version diff view to toolbar in Version History [GH-23200]
  • ui: Update pki mount configuration details to match the new mount configuration details pattern [GH-23166]
  • ui: add example modal to policy form [GH-21583]
  • ui: adds allowed_user_ids field to create role form and user_ids to generate certificates form in pki [GH-22191]
  • ui: display CertificateCard instead of MaskedInput for certificates in PKI [GH-22160]
  • ui: enables create and update KV secret workflow when control group present [GH-22471]
  • ui: implement hashicorp design system alert component [GH-21375]
  • ui: update detail views that render ttl durations to display full unit instead of letter (i.e. 'days' instead of 'd') [GH-20697]
  • ui: update unseal and DR operation token flow components [GH-21871]
  • ui: upgrade Ember to 4.12 [GH-22122]

DEPRECATIONS:

  • auth/centrify: Centrify plugin is deprecated as of 1.15, slated for removal in 1.17 [GH-23050]

BUG FIXES:

  • activity (enterprise): Fix misattribution of entities to no or child namespace auth methods [GH-18809]
  • agent: Environment variable VAULT_CACERT_BYTES now works for Vault Agent templates. [GH-22322]
  • agent: Fix "generate-config" command documentation URL [GH-21466]
  • api/client: Fix deadlock in client.CloneWithHeaders when used alongside other client methods. [GH-22410]
  • api: Fix breakage with UNIX domain socket addresses introduced by newest Go versions as a security fix. [GH-22523]
  • audit: Prevent panic due to nil pointer receiver for audit header formatting. [GH-22694]
  • auth/azure: Fix intermittent 401s by preventing performance secondary clusters from rotating root credentials. [GH-21800]
  • auth/token, sys: Fix path-help being unavailable for some list-only endpoints [GH-18571]
  • auth/token: Fix parsing of auth/token/create fields to avoid incorrect warnings about ignored parameters [GH-18556]
  • awsutil: Update awsutil to v0.2.3 to fix a regression where Vault no longer
    respects AWS_ROLE_ARN, AWS_WEB_IDENTITY_TOKEN_FILE, and AWS_ROLE_SESSION_NAME. [GH-21951]
  • cli: Avoid printing "Success" message when -field flag is provided during a vault write. [GH-21546]
  • cli: Fix the CLI failing to return wrapping information for KV PUT and PATCH operations when format is set to table. [GH-22818]
  • core (enterprise): Fix sentinel policy check logic so that sentinel
    policies are not used when Sentinel feature isn't licensed.
  • core (enterprise): Remove MFA Configuration for namespace when deleting namespace
  • core/managed-keys (enterprise): Allow certain symmetric PKCS#11 managed key mechanisms (AES CBC with and without padding) to operate without an HMAC.
  • core/metrics: vault.raft_storage.bolt.write.time should be a counter not a summary [GH-22468]
  • core/quotas (enterprise): Fix a case where we were applying login roles to lease count quotas in a non-login context.
    Also fix a related potential deadlock. [GH-21110]
  • core/quotas: Only perform ResolveRoleOperation for role-based quotas and lease creation. [GH-22597]
  • core/quotas: Reduce overhead for role calculation when using cloud auth methods. [GH-22583]
  • core: Remove "expiration manager is nil on tokenstore" error log for unauth requests on DR secondary as they do not have expiration manager. [GH-22137]
  • core: All subloggers now reflect configured log level on reload. [GH-22038]
  • core: Fix bug where background thread to update locked user entries runs on DR secondaries. [GH-22355]
  • core: Fix readonly errors that could occur while loading mounts/auths during unseal [GH-22362]
  • core: Fixed an instance where incorrect route entries would get tainted. We now pre-calculate namespace specific paths to avoid this. [GH-21470]
  • core: Fixed issue with some durations not being properly parsed to include days. [GH-21357]
  • core: Fixes list password policy to include those with names containing / characters. [GH-23155]
  • core: fix race when updating a mount's route entry tainted status and incoming requests [GH-21640]
  • docs: fix wrong api path for ldap secrets cli-commands [GH-23225]
  • events: Ensure subscription resources are cleaned up on close. [GH-23042]
  • expiration: Fix a deadlock that could occur when a revocation failure happens while restoring leases on startup. [GH-22374]
  • identity/mfa: Fixes to OpenAPI representation and returned error codes for identity/mfa/method/* APIs [GH-20879]
  • identity: Remove caseSensitivityKey to prevent errors while loading groups which could result in missing groups in memDB when duplicates are found. [GH-20965]
  • license: Add autoloaded license path to the cache exempt list. This is to ensure the license changes on the active node is observed on the perfStandby node. [GH-22363]
  • openapi: Fix response schema for PKI Issue requests [GH-21449]
  • openapi: Fix schema definitions for PKI EAB APIs [GH-21458]
  • plugins: Containerized plugins can be run with mlock enabled. [GH-23215]
  • plugins: Fix instance where Vault could fail to kill broken/unresponsive plugins. [GH-22914]
  • plugins: Fix instance where broken/unresponsive plugins could cause Vault to hang. [GH-22914]
  • plugins: Runtime catalog returns 404 instead of 500 when reading a runtime that does not exist [GH-23171]
  • plugins: vault plugin runtime list can successfully list plugin runtimes with GET [GH-23171]
  • raft/autopilot: Add dr-token flag for raft autopilot cli commands [GH-21165]
  • replication (enterprise): Fix bug sync invalidate CoreReplicatedClusterInfoPath
  • replication (enterprise): Fix discovery of bad primary cluster addresses to be more reliable
  • replication (enterprise): Fix panic when update-primary was called on demoted clusters using update_primary_addrs
  • replication (enterprise): Fixing a bug by which the atomicity of a merkle diff result could be affected. This means it could be a source of a merkle-diff & sync process failing to switch into stream-wal mode afterwards.
  • replication (enterprise): Sort cluster addresses returned by echo requests, so that primary-addrs only gets persisted when the
    set of addrs changes.
  • replication (enterprise): update primary cluster address after DR failover
  • sdk/ldaputil: Properly escape user filters when using UPN domains
    sdk/ldaputil: use EscapeLDAPValue implementation from cap/ldap [GH-22249]
  • secrets/azure: Fix intermittent 401s by preventing performance secondary clusters from rotating root credentials. [GH-21631]
  • secrets/ldap: Fix bug causing schema and password_policy to be overwritten in config. [GH-22330]
  • secrets/pki: Fix bug with ACME tidy, 'unable to determine acme base folder path'. [GH-21870]
  • secrets/pki: Fix preserving acme_account_safety_buffer on config/auto-tidy. [GH-21870]
  • secrets/pki: Fix removal of issuers to clean up unreferenced CRLs. [GH-23007]
  • secrets/pki: Prevent deleted issuers from reappearing when migrating from a version 1 bundle to a version 2 bundle (versions including 1.13.0, 1.12.2, and 1.11.6); when managed keys were removed but referenced in the Vault 1.10 legacy CA bundle, this the error: no managed key found with uuid. [GH-21316]
  • secrets/pki: allowed_domains are now compared in a case-insensitive manner if they use glob patterns [GH-22126]
  • secrets/transform (enterprise): Batch items with repeated tokens in the tokenization decode api will now contain the decoded_value element
  • secrets/transform (enterprise): Fix nil panic when deleting a template with tokenization transformations present
  • secrets/transform (enterprise): Fix nil panic when encoding a tokenization transformation on a non-active node
  • secrets/transform (enterprise): Grab shared locks for various read operations, only escalating to write locks if work is required
  • secrets/transform (enterprise): Tidy operations will be re-scheduled at a minimum of every minute, not a maximum of every minute
  • secrets/transit: fix panic when providing non-PEM formatted public key for import [GH-22753]
  • serviceregistration: Fix bug where multiple nodes in a secondary cluster could be labelled active after updating the cluster's primary [GH-21642]
  • storage/consul: Consul service registration tags are now case-sensitive. [GH-6483]
  • storage/raft: Fix race where new follower joining can get pruned by dead server cleanup. [GH-20986]
  • ui (enterprise): Fix error message when generating SSH credential with control group [GH-23025]
  • ui: Adds missing values to details view after generating PKI certificate [GH-21635]
  • ui: Fix blank page or ghost secret when canceling KV secret create [GH-22541]
  • ui: Fix display for "Last Vault Rotation" timestamp for static database roles which was not rendering or copyable [GH-22519]
  • ui: Fix styling for username input when editing a user [GH-21771]
  • ui: Fix styling for viewing certificate in kubernetes configuration [GH-21968]
  • ui: Fix the issue where confirm delete dropdown is being cut off [GH-23066]
  • ui: Fixed an issue where editing an SSH role would clear default_critical_options and default_extension if left unchanged. [GH-21739]
  • ui: Fixed secrets, leases, and policies filter dropping focus after a single character [GH-21767]
  • ui: Fixes filter and search bug in secrets engines [GH-23123]
  • ui: Fixes form field label tooltip alignment [GH-22832]
  • ui: Fixes issue with certain navigational links incorrectly displaying in child namespaces [GH-21562]
  • ui: Fixes login screen display issue with Safari browser [GH-21582]
  • ui: Fixes problem displaying certificates issued with unsupported signature algorithms (i.e. ed25519) [GH-21926]
  • ui: Fixes styling of private key input when configuring an SSH key [GH-21531]
  • ui: Surface DOMException error when browser settings prevent localStorage. [GH-21503]
  • ui: correct doctype for index.html [GH-22153]
  • ui: don't exclude features present on license [GH-22855]
  • ui: fixes max_versions default for secret metadata unintentionally overriding kv engine defaults [GH-22394]
  • ui: fixes long namespace names overflow in the sidebar
  • ui: fixes model defaults overwriting input value when user tries to clear form input [GH-22458]
  • ui: fixes text readability issue in revoke token confirmation dialog [GH-22390]

v1.14.0

Compare Source

1.14.0

June 21, 2023

BREAKING CHANGES:

  • secrets/pki: Maintaining running count of certificates will be turned off by default.
    To re-enable keeping these metrics available on the tidy status endpoint, enable
    maintain_stored_certificate_counts on tidy-config, to also publish them to the
    metrics consumer, enable publish_stored_certificate_count_metrics . [GH-18186]

CHANGES:

  • auth/alicloud: Updated plugin from v0.14.0 to v0.15.0 [GH-20758]
  • auth/azure: Updated plugin from v0.13.0 to v0.15.0 [GH-20816]
  • auth/centrify: Updated plugin from v0.14.0 to v0.15.1 [GH-20745]
  • auth/gcp: Updated plugin from v0.15.0 to v0.16.0 [GH-20725]
  • auth/jwt: Updated plugin from v0.15.0 to v0.16.0 [GH-20799]
  • auth/kubernetes: Update plugin to v0.16.0 [GH-20802]
  • core: Bump Go version to 1.20.5.
  • core: Remove feature toggle for SSCTs, i.e. the env var VAULT_DISABLE_SERVER_SIDE_CONSISTENT_TOKENS. [GH-20834]
  • core: Revert #​19676 (VAULT_GRPC_MIN_CONNECT_TIMEOUT env var) as we decided it was unnecessary. [GH-20826]
  • database/couchbase: Updated plugin from v0.9.0 to v0.9.2 [GH-20764]
  • database/redis-elasticache: Updated plugin from v0.2.0 to v0.2.1 [GH-20751]
  • replication (enterprise): Add a new parameter for the update-primary API call
    that allows for setting of the primary cluster addresses directly, instead of
    via a token.
  • secrets/ad: Updated plugin from v0.10.1-0.20230329210417-0b2cdb26cf5d to v0.16.0 [GH-20750]
  • secrets/alicloud: Updated plugin from v0.5.4-beta1.0.20230330124709-3fcfc5914a22 to v0.15.0 [GH-20787]
  • secrets/aure: Updated plugin from v0.15.0 to v0.16.0 [GH-20777]
  • secrets/database/mongodbatlas: Updated plugin from v0.9.0 to v0.10.0 [GH-20882]
  • secrets/database/snowflake: Updated plugin from v0.7.0 to v0.8.0 [GH-20807]
  • secrets/gcp: Updated plugin from v0.15.0 to v0.16.0 [GH-20818]
  • secrets/keymgmt: Updated plugin to v0.9.1
  • secrets/kubernetes: Update plugin to v0.5.0 [GH-20802]
  • secrets/mongodbatlas: Updated plugin from v0.9.1 to v0.10.0 [GH-20742]
  • secrets/pki: Allow issuance of root CAs without AIA, when templated AIA information includes issuer_id. [GH-21209]
  • secrets/pki: Warning when issuing leafs from CSRs with basic constraints. In the future, issuance of non-CA leaf certs from CSRs with asserted IsCA Basic Constraints will be prohibited. [GH-20654]

FEATURES:

  • AWS Static Roles: The AWS Secrets Engine can manage static roles configured by users. [GH-20536]
  • Automated License Utilization Reporting: Added automated license
    utilization reporting, which sends minimal product-license metering
    data

    to HashiCorp without requiring you to manually collect and report them.
  • Environment Variables through Vault Agent: Introducing a new process-supervisor mode for Vault Agent which allows injecting secrets as environment variables into a child process using a new env_template configuration stanza. The process-supervisor configuration can be generated with a new vault agent generate-config helper tool. [GH-20530]
  • MongoDB Atlas Database Secrets: Adds support for client certificate credentials [GH-20425]
  • MongoDB Atlas Database Secrets: Adds support for generating X.509 certificates on dynamic roles for user authentication [GH-20882]
  • NEW PKI Workflow in UI: Completes generally available rollout of new PKI UI that provides smoother mount configuration and a more guided user experience [GH-pki-ui-improvements]
  • Secrets/Auth Plugin Multiplexing: The plugin will be multiplexed when run
    as an external plugin by vault versions that support secrets/auth plugin
    multiplexing (> 1.12) [GH-19215]
  • Sidebar Navigation in UI: A new sidebar navigation panel has been added in the UI to replace the top navigation bar. [GH-19296]
  • Vault PKI ACME Server: Support for the ACME certificate lifecycle management protocol has been added to the Vault PKI Plugin. This allows standard ACME clients, such as the EFF's certbot and the CNCF's k8s cert-manager, to request certificates from a Vault server with no knowledge of Vault APIs or authentication mechanisms. For public-facing Vault instances, we recommend requiring External Account Bindings (EAB) to limit the ability to request certificates to only authenticated clients. [GH-20752]
  • Vault Proxy: Introduced Vault Proxy, a new subcommand of the Vault binary that can be invoked using vault proxy -config=config.hcl. It currently has the same feature set as Vault Agent's API proxy, but the two may diverge in the future. We plan to deprecate the API proxy functionality of Vault Agent in a future release. [GH-20548]
  • OCI Auto-Auth: Add OCI (Oracle Cloud Infrastructure) auto-auth method [GH-19260]

IMPROVEMENTS:

  • api: Add Config.TLSConfig method to fetch the TLS configuration from a client config. [GH-20265]
  • physical/etcd: Upgrade etcd3 client to v3.5.7 [GH-20261]
  • activitylog: EntityRecord protobufs now contain a ClientType field for
    distinguishing client sources. [GH-20626]
  • agent: Add integration tests for agent running in process supervisor mode [GH-20741]
  • agent: Add logic to validate env_template entries in configuration [GH-20569]
  • agent: Added reload option to cert auth configuration in case of external renewals of local x509 key-pairs. [GH-19002]
  • agent: JWT auto-auth has a new config option, remove_jwt_follows_symlinks (default: false), that, if set to true will now remove the JWT, instead of the symlink to the JWT, if a symlink to a JWT has been provided in the path option, and the remove_jwt_after_reading config option is set to true (default). [GH-18863]
  • agent: Vault Agent now reports its name and version as part of the User-Agent header in all requests issued. [GH-19776]
  • agent: initial implementation of a process runner for injecting secrets via environment variables via vault agent [GH-20628]
  • api: GET ... /sys/internal/counters/activity?current_billing_period=true now
    results in a response which contains the full billing period [GH-20694]
  • api: /sys/internal/counters/config endpoint now contains read-only
    minimum_retention_months. [GH-20150]
  • api: /sys/internal/counters/config endpoint now contains read-only
    reporting_enabled and billing_start_timestamp fields. [GH-20086]
  • api: property based testing for LifetimeWatcher sleep duration calculation [GH-17919]
  • audit: add plugin metadata, including plugin name, type, version, sha256, and whether plugin is external, to audit logging [GH-19814]
  • audit: forwarded requests can now contain host metadata on the node it was sent 'from' or a flag to indicate that it was forwarded.
  • auth/cert: Better return OCSP validation errors during login to the caller. [GH-20234]
  • auth/kerberos: Enable plugin multiplexing
    auth/kerberos: Upgrade plugin dependencies [GH-20771]
  • auth/ldap: allow configuration of alias dereferencing in LDAP search [GH-18230]
  • auth/ldap: allow providing the LDAP password via an env var when authenticating via the CLI [GH-18225]
  • auth/oidc: Adds support for group membership parsing when using IBM ISAM as an OIDC provider. [GH-19247]
  • build: Prefer GOBIN when set over GOPATH/bin when building the binary [GH-19862]
  • cli: Add walkSecretsTree helper function, which recursively walks secrets rooted at the given path [GH-20464]
  • cli: Improve addPrefixToKVPath helper [GH-20488]
  • command/server (enterprise): -dev-three-node now creates perf standbys instead of regular standbys. [GH-20629]
  • command/server: Add support for dumping pprof files to the filesystem via SIGUSR2 when
    VAULT_PPROF_WRITE_TO_FILE=true is set on the server. [GH-20609]
  • command/server: New -dev-cluster-json writes a file describing the dev cluster in -dev and -dev-three-node modes, plus -dev-three-node now enables unauthenticated metrics and pprof requests. [GH-20224]
  • core (enterprise): add configuration for license reporting [GH-19891]
  • core (enterprise): license updates trigger a reload of reporting and the activity log [GH-20680]
  • core (enterprise): support reloading configuration for automated reporting via SIGHUP [GH-20680]
  • core (enterprise): vault server command now allows for opt-out of automated
    reporting via the OPTOUT_LICENSE_REPORTING environment variable. [GH-3939]
  • core, secrets/pki, audit: Update dependency go-jose to v3 due to v2 deprecation. [GH-20559]
  • core/activity: error when attempting to update retention configuration below the minimum [GH-20078]
  • core/activity: refactor the activity log's generation of precomputed queries [GH-20073]
  • core: Add possibility to decode a generated encoded root token via the rest API [GH-20595]
  • core: include namespace path in granting_policies block of audit log
  • core: include reason for ErrReadOnly on PBPWF writing failures
  • core: report intermediate error messages during request forwarding [GH-20643]
  • core:provide more descriptive error message when calling enterprise feature paths in open-source [GH-18870]
  • database/elasticsearch: Upgrade plugin dependencies [GH-20767]
  • database/mongodb: upgrade mongo driver to 1.11 [GH-19954]
  • database/redis: Upgrade plugin dependencies [GH-20763]
  • http: Support responding to HEAD operation from plugins [GH-19520]
  • openapi: Add openapi response definitions to /sys defined endpoints. [GH-18633]
  • openapi: Add openapi response definitions to pki/config_*.go [GH-18376]
  • openapi: Add openapi response definitions to vault/logical_system_paths.go defined endpoints. [GH-18515]
  • openapi: Consistently stop Vault server on exit in gen_openapi.sh [GH-19252]
  • openapi: Improve operationId/request/response naming strategy [GH-19319]
  • openapi: add openapi response definitions to /sys/internal endpoints [GH-18542]
  • openapi: add openapi response definitions to /sys/rotate endpoints [GH-18624]
  • openapi: add openapi response definitions to /sys/seal endpoints [GH-18625]
  • openapi: add openapi response definitions to /sys/tool endpoints [GH-18626]
  • openapi: add openapi response definitions to /sys/version-history, /sys/leader, /sys/ha-status, /sys/host-info, /sys/in-flight-req [GH-18628]
  • openapi: add openapi response definitions to /sys/wrapping endpoints [GH-18627]
  • openapi: add openapi response defintions to /sys/auth endpoints [GH-18465]
  • openapi: add openapi response defintions to /sys/capabilities endpoints [GH-18468]
  • openapi: add openapi response defintions to /sys/config and /sys/generate-root endpoints [GH-18472]
  • openapi: added ability to validate response structures against openapi schema for test clusters [GH-19043]
  • sdk/framework: Fix non-deterministic ordering of 'required' fields in OpenAPI spec [GH-20881]
  • sdk: Add new docker-based cluster testing framework to the sdk. [GH-20247]
  • secrets/ad: upgrades dependencies [GH-19829]
  • secrets/alicloud: upgrades dependencies [GH-19846]
  • secrets/consul: Improve error message when ACL bootstrapping fails. [GH-20891]
  • secrets/database: Adds error message requiring password on root crednetial rotation. [GH-19103]
  • secrets/gcpkms: Enable plugin multiplexing
    secrets/gcpkms: Upgrade plugin dependencies [GH-20784]
  • secrets/mongodbatlas: upgrades dependencies [GH-19861]
  • secrets/openldap: upgrades dependencies [GH-19993]
  • secrets/pki: Add missing fields to tidy-status, include new last_auto_tidy_finished field. [GH-20442]
  • secrets/pki: Add warning when issuer lacks KeyUsage during CRL rebuilds; expose in logs and on rotation. [GH-20253]
  • secrets/pki: Allow determining existing issuers and keys on import. [GH-20441]
  • secrets/pki: Include CA serial number, key UUID on issuers list endpoint. [GH-20276]
  • secrets/pki: Limit ACME issued certificates NotAfter TTL to a maximum of 90 days [GH-20981]
  • secrets/pki: Support TLS-ALPN-01 challenge type in ACME for DNS certificate identifiers. [GH-20943]
  • secrets/pki: add subject key identifier to read key response [GH-20642]
  • secrets/postgresql: Add configuration to scram-sha-256 encrypt passwords on Vault before sending them to PostgreSQL [GH-19616]
  • secrets/terraform: upgrades dependencies [GH-19798]
  • secrets/transit: Add support to import public keys in transit engine and allow encryption and verification of signed data [GH-17934]
  • secrets/transit: Allow importing RSA-PSS OID (1.2.840.113549.1.1.10) private keys via BYOK. [GH-19519]
  • secrets/transit: Respond to writes with updated key policy, cache configuration. [GH-20652]
  • secrets/transit: Support BYOK-encrypted export of keys to securely allow synchronizing specific keys and version across clusters. [GH-20736]
  • ui: Add download button for each secret value in KV v2 [GH-20431]
  • ui: Add filtering by auth type and auth name to the Authentication Method list view. [GH-20747]
  • ui: Add filtering by engine type and engine name to the Secret Engine list view. [GH-20481]
  • ui: Adds whitespace warning to secrets engine and auth method path inputs [GH-19913]
  • ui: Remove the Bulma CSS framework. [GH-19878]
  • ui: Update Web CLI with examples and a new kv-get command for reading kv v2 data and metadata [GH-20590]
  • ui: Updates UI javascript dependencies [GH-19901]
  • ui: add allowed_managed_keys field to secret engine mount options [GH-19791]
  • ui: adds warning for commas in stringArray inputs and updates tooltip help text to remove references to comma separation [GH-20163]
  • ui: updates clients configuration edit form state based on census reporting configuration [GH-20125]
  • website/docs: Add rotate root documentation for azure secrets engine [GH-19187]
  • website/docs: fix database static-user sample payload [GH-19170]

BUG FIXES:

  • agent: Fix agent generate-config to accept -namespace, VAULT_NAMESPACE, and other client-modifying flags. [GH-21297]
  • agent: Fix bug with 'cache' stanza validation [GH-20934]
  • api: Addressed a couple of issues that arose as edge cases for the -output-policy flag. Specifically around properly handling list commands, distinguishing kv V1/V2, and correctly recognizing protected paths. [GH-19160]
  • api: Properly Handle nil identity_policies in Secret Data [GH-20636]
  • auth/ldap: Set default value for max_page_size properly [GH-20453]
  • auth/token: Fix cubbyhole and revocation for legacy service tokens [GH-19416]
  • cli/kv: add -mount flag to kv list [GH-19378]
  • core (enterprise): Don't delete backend stored data that appears to be filterable
    on this secondary if we don't have a corresponding mount entry.
  • core (enterprise): Fix intermittent issue with token entries sometimes not being found when using a newly created token in a request to a secondary, even when SSCT new_token forwarding is set. When this occurred, this would result in the following error to the client: error performing token check: no lease entry found for token that ought to have one, possible eventual consistency issue.
  • core (enterprise): Fix log shipper buffer size overflow issue for 32 bit architecture.
  • core (enterprise): Fix logshipper buffer size to default to DefaultBufferSize only when reported system memory is zero.
  • core (enterprise): Fix panic when using invalid accessor for control-group request
  • core (enterprise): Fix perf standby WAL streaming silently failures when replication setup happens at a bad time.
  • core (enterprise): Fix read on perf standbys failing with 412 after leadership change, unseal, restores or restarts when no writes occur
  • core (enterprise): Remove MFA Enforcment configuration for namespace when deleting namespace
  • core/ssct (enterprise): Fixed race condition where a newly promoted DR may revert sscGenCounter
    resulting in 412 errors.
  • core: Change where we evaluate filtered paths as part of mount operations; this is part of an enterprise bugfix that will
    have its own changelog entry. Fix wrong lock used in ListAuths link meta interface implementation. [GH-21260]
  • core: Do not cache seal configuration to fix a bug that resulted in sporadic auto unseal failures. [GH-21223]
  • core: Don't exit just because we think there's a potential deadlock. [GH-21342]
  • core: Fix Forwarded Writer construction to correctly find active nodes, allowing PKI cross-cluster functionality to succeed on existing mounts.
  • core: Fix panic in sealed nodes using raft storage trying to emit raft metrics [GH-21249]
  • core: Fix writes to readonly storage on performance standbys when user lockout feature is enabled. [GH-20783]
  • identity: Fixes duplicate groups creation with the same name but unique IDs. [GH-20964]
  • license (enterprise): Fix bug where license would update even if the license didn't change.
  • openapi: Small fixes for OpenAPI display attributes. Changed "log-in" to "login" [GH-20285]
  • plugin/reload: Fix a possible data race with rollback manager and plugin reload [GH-19468]
  • replication (enterprise): Fix a caching issue when replicating filtered data to
    a performance secondary. This r

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from a team as a code owner October 12, 2023 12:48
@github-actions
Copy link

github-actions bot commented Oct 12, 2023

Pull Request Test Coverage Report for Build 8379235091

Details

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage remained the same at 60.046%

Totals Coverage Status
Change from base Build 6586862225: 0.0%
Covered Lines: 263
Relevant Lines: 438

💛 - Coveralls

@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from 7a20a11 to 5ee711c Compare January 27, 2024 20:17
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.10.0 chore(deps): update module github.com/hashicorp/vault/api to v1.11.0 Jan 27, 2024
@github-actions github-actions bot added size/M and removed size/S labels Jan 27, 2024
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from 5ee711c to fa847dc Compare February 11, 2024 03:20
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.11.0 chore(deps): update module github.com/hashicorp/vault/api to v1.12.0 Feb 11, 2024
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from fa847dc to 59e5968 Compare March 16, 2024 20:19
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.12.0 chore(deps): update module github.com/hashicorp/vault/api to v1.12.1 Mar 16, 2024
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from 59e5968 to ac23f35 Compare March 21, 2024 17:26
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.12.1 chore(deps): update module github.com/hashicorp/vault/api to v1.12.2 Mar 21, 2024
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from ac23f35 to bd180c4 Compare April 22, 2024 13:00
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.12.2 chore(deps): update module github.com/hashicorp/vault/api to v1.13.0 Apr 22, 2024
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from bd180c4 to 7cceb58 Compare May 9, 2024 10:11
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from 7cceb58 to 11c1176 Compare May 26, 2024 01:11
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.13.0 chore(deps): update module github.com/hashicorp/vault/api to v1.14.0 May 26, 2024
Copy link
Contributor Author

renovate bot commented Jun 4, 2024

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 7 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.20 -> 1.23.1
github.com/cenkalti/backoff/v4 v4.2.0 -> v4.3.0
github.com/hashicorp/go-retryablehttp v0.6.6 -> v0.7.7
golang.org/x/crypto v0.6.0 -> v0.23.0
golang.org/x/net v0.8.0 -> v0.25.0
golang.org/x/sys v0.6.0 -> v0.20.0
golang.org/x/term v0.6.0 -> v0.20.0
golang.org/x/text v0.8.0 -> v0.15.0

@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from 11c1176 to 748c9e1 Compare June 16, 2024 00:45
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.14.0 chore(deps): update module github.com/hashicorp/vault/api to v1.14.0 - autoclosed Jul 4, 2024
@renovate renovate bot closed this Jul 4, 2024
@renovate renovate bot deleted the renovate/github.com-hashicorp-vault-api-1.x branch July 4, 2024 18:05
@renovate renovate bot restored the renovate/github.com-hashicorp-vault-api-1.x branch July 4, 2024 22:41
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.14.0 - autoclosed chore(deps): update module github.com/hashicorp/vault/api to v1.14.0 Jul 4, 2024
@renovate renovate bot reopened this Jul 4, 2024
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from 748c9e1 to 84b5174 Compare July 5, 2024 00:45
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from 84b5174 to b8236ce Compare September 11, 2024 14:52
@renovate renovate bot force-pushed the renovate/github.com-hashicorp-vault-api-1.x branch from b8236ce to 9261780 Compare September 13, 2024 20:01
@renovate renovate bot changed the title chore(deps): update module github.com/hashicorp/vault/api to v1.14.0 chore(deps): update module github.com/hashicorp/vault/api to v1.15.0 Sep 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants