lrstanley / vault-unseal

auto-unseal utility for Hashicorp Vault
MIT License
238 stars 32 forks source link

build(deps): bump github.com/hashicorp/vault/api from 1.8.1 to 1.8.2 #23

Closed dependabot[bot] closed 2 years ago

dependabot[bot] commented 2 years ago

Bumps github.com/hashicorp/vault/api from 1.8.1 to 1.8.2.

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.8.2

1.8.2

26 August 2021

CHANGES:

  • go: Update go version to 1.16.7 [GH-12408]

BUG FIXES:

  • auth/aws: Fixes ec2 login no longer supporting DSA signature verification [GH-12340]
  • cli: vault debug now puts newlines after every captured log line. [GH-12175]
  • database/couchbase: change default template to truncate username at 128 characters [GH-12300]
  • identity: Fix a panic on arm64 platform when doing identity I/O. [GH-12371]
  • physical/raft: Fix safeio.Rename error when restoring snapshots on windows [GH-12377]
  • plugin/snowflake: Fixed bug where plugin would crash on 32 bit systems [GH-12378]
  • sdk/database: Fix a DeleteUser error message on the gRPC client. [GH-12351]
  • secrets/gcp: Fixes a potential panic in the service account policy rollback for rolesets. [GH-12379]
  • ui: Fixed api explorer routing bug [GH-12354]
  • ui: Fixes metrics page when read on counter config not allowed [GH-12348]
  • ui: fix issue where on MaskedInput on auth methods if tab it would clear the value. [GH-12409]
Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.8.12

June 10, 2022

BUG FIXES:

  • agent: Redact auto auth token from renew endpoints [GH-15380]
  • core: Prevent changing file permissions of audit logs when mode 0000 is used. [GH-15759]
  • core: fixed systemd reloading notification [GH-15041]
  • core: pre-calculate namespace specific paths when tainting a route during postUnseal [GH-15067]
  • storage/raft (enterprise): Auto-snapshot configuration now forbids slashes in file prefixes for all types, and "/" in path prefix for local storage type. Strip leading prefix in path prefix for AWS. Improve error handling/reporting.
  • transform (enterprise): Fix non-overridable column default value causing tokenization tokens to expire prematurely when using the MySQL storage backend.

1.8.11

April 29, 2022

BUG FIXES:

  • raft: fix Raft TLS key rotation panic that occurs if active key is more than 24 hours old [GH-15156]
  • sdk: Fix OpenApi spec generator to properly convert TypeInt64 to OAS supported int64 [GH-15104]

1.8.10

April 22, 2022

CHANGES:

  • core: A request that fails path validation due to relative path check will now be responded to with a 400 rather than 500. [GH-14328]
  • core: Bump Go version to 1.16.15. [GH-go-ver-1810]

IMPROVEMENTS:

  • auth/ldap: Add username_as_alias configurable to change how aliases are named [GH-14324]
  • core: Systemd unit file included with the Linux packages now sets the service type to notify. [GH-14385]
  • sentinel (enterprise): Upgrade sentinel to v0.18.5 to avoid potential naming collisions in the remote installer

BUG FIXES:

  • api/sys/raft: Update RaftSnapshotRestore to use net/http client allowing bodies larger than allocated memory to be streamed [GH-14269]
  • auth/approle: Add maximum length for input values that result in SHA56 HMAC calculation [GH-14746]
  • cassandra: Update gocql Cassandra client to fix "no hosts available in the pool" error [GH-14973]
  • cli: Fix panic caused by parsing key=value fields whose value is a single backslash [GH-14523]
  • core: Fix panic caused by parsing JSON integers for fields defined as comma-delimited integers [GH-15072]
  • core: Fix panic caused by parsing JSON integers for fields defined as comma-delimited strings [GH-14522]
  • core: Fix panic caused by parsing policies with empty slice values. [GH-14501]
  • core: Fix panic for help request URL paths without /v1/ prefix [GH-14704]
  • core: fixing excessive unix file permissions [GH-14791]
  • core: fixing excessive unix file permissions on dir, files and archive created by vault debug command [GH-14846]
  • core: report unused or redundant keys in server configuration [GH-14752]
  • core: time.After() used in a select statement can lead to memory leak [GH-14814]
  • metrics/autosnapshots (enterprise) : Fix bug that could cause vault.autosnapshots.save.errors to not be incremented when there is an

... (truncated)

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)