auth/cert: compare public keys of trusted non-CA certificates with incoming
client certificates to prevent trusting certs with the same serial number
but not the same public/private key. [GH-25649]
auth/cert: validate OCSP response was signed by the expected issuer and serial number matched request [GH-26091]
secrets/transit: fix a regression that was honoring nonces provided in non-convergent modes during encryption. [GH-22852]
cli: Using vault plugin reload with -plugin in the root namespace will now reload the plugin across all namespaces instead of just the root namespace. [GH-24878]
cli: vault plugin info and vault plugin deregister now require 2 positional arguments instead of accepting either 1 or 2. [GH-24250]
core (enterprise): Seal High Availability (HA) must be enabled by enable_multiseal in configuration.
core: Bump Go version to 1.21.8.
database/couchbase: Update plugin to v0.10.1 [GH-25275]
database/elasticsearch: Update plugin to v0.14.0 [GH-25263]
database/mongodbatlas: Update plugin to v0.11.0 [GH-25264]
database/redis-elasticache: Update plugin to v0.3.0 [GH-25296]
database/redis: Update plugin to v0.2.3 [GH-25289]
database/snowflake: Update plugin to v0.10.0 [GH-25143]
database/snowflake: Update plugin to v0.9.1 [GH-25020]
events: Remove event noficiations websocket endpoint in non-Enterprise [GH-25640]
events: Source URL is now vault://{vault node} [GH-24201]
identity (enterprise): POST requests to the /identity/entity/merge endpoint
are now always forwarded from standbys to the active node. [GH-24325]
plugins/database: Reading connection config at database/config/:name will now return a computed running_plugin_version field if a non-builtin version is running. [GH-25105]
plugins: Add a warning to the response from sys/plugins/reload/backend if no plugins were reloaded. [GH-24512]
plugins: By default, environment variables provided during plugin registration will now take precedence over system environment variables.
This release contains the three security fixes from 1.0.0 and 1.0.1 and the
following bug fixes from 1.0.0/1.0.1:
namespaces: Correctly reload the proper mount when tuning or reloading the
mount [GH-5937]
replication/perfstandby: Fix audit table upgrade on standbys [GH-5811]
replication/perfstandby: Fix redirect on approle update [GH-5820]
secrets/kv: Fix issue where storage version would get incorrectly downgraded
[GH-5809]
It is otherwise identical to 0.11.5.
0.11.5 (November 13th, 2018)
BUG FIXES:
agent: Fix issue when specifying two file sinks [GH-5610]
auth/userpass: Fix minor timing issue that could leak the presence of a
username [GH-5614]
autounseal/alicloud: Fix issue interacting with the API (Enterprise)
autounseal/azure: Fix key version tracking (Enterprise)
cli: Fix panic that could occur if parameters were not provided [GH-5603]
core: Fix buggy behavior if trying to remount into a namespace
identity: Fix duplication of entity alias entity during alias transfer
between entities [GH-5733]
namespaces: Fix tuning of auth mounts in a namespace
ui: Fix bug where editing secrets as JSON doesn't save properly [GH-5660]
ui: Fix issue where IE 11 didn't render the UI and also had a broken form
when trying to use tool/hash [GH-5714]
0.11.4 (October 23rd, 2018)
CHANGES:
core: HA lock file is no longer copied during operator migrate [GH-5503].
We've categorized this as a change, but generally this can be considered
just a bug fix, and no action is needed.
FEATURES:
Transit Key Trimming: Keys in transit secret engine can now be trimmed to
remove older unused key versions
Web UI support for KV Version 2: Browse, delete, undelete and destroy
individual secret versions in the UI
Azure Existing Service Principal Support: Credentials can now be generated
against an existing service principal
IMPROVEMENTS:
... (truncated)
Commits
c20eae3 [VAULT-25372] This is an automated pull request to build all artifacts for a ...
6f4631e backport of commit 792eb3b8c314fc82b46883fcf61227687026829d (#26132)
314b34d Backport of doc: Add kault library reference into release/1.16.x (#26130)
6ff205f Backport of Clarify wrapping token language into release/1.16.x (#26126)
5875218 backport of commit de7c905477d53391bed6a404d43f8ce3789d0a8e (#26128)
d623bce backport of commit f661f4354ceb36bc9208f5474a19355d3a1016fe (#26124)
4bfb027 backport of commit fa469f8bdc469570b8edaa72517433305ce2e26d (#26122)
bc9c844 backport of commit 3df09357b25b5180b2147f35dd669d83f37ac547 (#26121)
6a694d0 Backport of Docs/vault 23837/sync doc update into release/1.16.x (#26058)
84bc41c backport of commit 7b939bdbfd628b3870473f840a9ef5aee228927f (#26117)
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
- `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/GoogleCloudPlatform/terraformer/network/alerts).
Bumps github.com/hashicorp/vault from 0.10.4 to 1.16.0.
Release notes
Sourced from github.com/hashicorp/vault's releases.
... (truncated)
Changelog
Sourced from github.com/hashicorp/vault's changelog.
... (truncated)
Commits
c20eae3
[VAULT-25372] This is an automated pull request to build all artifacts for a ...6f4631e
backport of commit 792eb3b8c314fc82b46883fcf61227687026829d (#26132)314b34d
Backport of doc: Add kault library reference into release/1.16.x (#26130)6ff205f
Backport of Clarify wrapping token language into release/1.16.x (#26126)5875218
backport of commit de7c905477d53391bed6a404d43f8ce3789d0a8e (#26128)d623bce
backport of commit f661f4354ceb36bc9208f5474a19355d3a1016fe (#26124)4bfb027
backport of commit fa469f8bdc469570b8edaa72517433305ce2e26d (#26122)bc9c844
backport of commit 3df09357b25b5180b2147f35dd669d83f37ac547 (#26121)6a694d0
Backport of Docs/vault 23837/sync doc update into release/1.16.x (#26058)84bc41c
backport of commit 7b939bdbfd628b3870473f840a9ef5aee228927f (#26117)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show