hashicorp / vault-plugin-database-couchbase

Mozilla Public License 2.0
6 stars 5 forks source link

Bump github.com/hashicorp/vault/sdk from 0.5.3 to 0.8.1 #38

Closed dependabot[bot] closed 1 year ago

dependabot[bot] commented 1 year ago

Bumps github.com/hashicorp/vault/sdk from 0.5.3 to 0.8.1.

Changelog

Sourced from github.com/hashicorp/vault/sdk's changelog.

0.8.1 (August 16th, 2017)

DEPRECATIONS/CHANGES:

  • PKI Root Generation: Calling pki/root/generate when a CA cert/key already exists will now return a 204 instead of overwriting an existing root. If you want to recreate the root, first run a delete operation on pki/root (requires sudo capability), then generate it again.

FEATURES:

  • Oracle Secret Backend: There is now an external plugin to support leased credentials for Oracle databases (distributed separately).
  • GCP IAM Auth Backend: There is now an authentication backend that allows using GCP IAM credentials to retrieve Vault tokens. This is available as both a plugin and built-in to Vault.
  • PingID Push Support for Path-Based MFA (Enterprise): PingID Push can now be used for MFA with the new path-based MFA introduced in Vault Enterprise 0.8.
  • Permitted DNS Domains Support in PKI: The pki backend now supports specifying permitted DNS domains for CA certificates, allowing you to narrowly scope the set of domains for which a CA can issue or sign child certificates.
  • Plugin Backend Reload Endpoint: Plugin backends can now be triggered to reload using the sys/plugins/reload/backend endpoint and providing either the plugin name or the mounts to reload.
  • Self-Reloading Plugins: The plugin system will now attempt to reload a crashed or stopped plugin, once per request.

IMPROVEMENTS:

  • auth/approle: Allow array input for policies in addition to comma-delimited strings [GH-3163]
  • plugins: Send logs through Vault's logger rather than stdout [GH-3142]
  • secret/pki: Add pki/root delete operation [GH-3165]
  • secret/pki: Don't overwrite an existing root cert/key when calling generate [GH-3165]

BUG FIXES:

  • aws: Don't prefer a nil HTTP client over an existing one [GH-3159]
  • core: If there is an error when checking for create/update existence, return 500 instead of 400 [GH-3162]
  • secret/database: Avoid creating usernames that are too long for legacy MySQL [GH-3138]

0.8.0 (August 9th, 2017)

SECURITY:

... (truncated)

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)