morningconsult / docker-credential-vault-login

Automatically gets docker credentials from Hashicorp Vault
Apache License 2.0
77 stars 11 forks source link

chore(deps): bump github.com/hashicorp/vault from 1.3.0 to 1.3.2 #35

Closed dependabot-preview[bot] closed 4 years ago

dependabot-preview[bot] commented 4 years ago

Bumps github.com/hashicorp/vault from 1.3.0 to 1.3.2.

Changelog

Sourced from github.com/hashicorp/vault's changelog.

1.3.2 (January 22nd, 2020)

SECURITY:

  • When deleting a namespace on Vault Enterprise, in certain circumstances, the deletion process will fail to revoke dynamic secrets for a mount in that namespace. This will leave any dynamic secrets in remote systems alive and will fail to clean them up. This vulnerability, CVE-2020-7220, affects Vault Enterprise 0.11.0 and newer.

IMPROVEMENTS:

  • auth/aws: Add aws metadata to identity alias GH-7975
  • auth/kubernetes: Allow both names and namespaces to be set to "*" GH-78

BUG FIXES:

  • auth/azure: Fix Azure compute client to use correct base URL [AZURE-27]
  • auth/ldap: Fix renewal of tokens without cofigured policies that are generated by an LDAP login GH-8072
  • auth/okta: Fix renewal of tokens without configured policies that are generated by an Okta login GH-8072
  • core: Fix seal migration error when attempting to migrate from auto unseal to shamir GH-8172
  • core: Fix seal migration config issue when migrating from auto unseal to auto unseal GH-8172
  • plugin: Fix issue where a plugin unwrap request potentially used an expired token GH-8058
  • replication: Fix issue where a forwarded request from a performance/standby node could run into a timeout
  • secrets/database: Fix issue where a manual static role rotation could potentially panic GH-8098
  • secrets/database: Fix issue where a manual root credential rotation request is not forwarded to the primary node GH-8125
  • secrets/database: Fix issue where a manual static role rotation request is not forwarded to the primary node GH-8126
  • secrets/database/mysql: Fix issue where special characters for a MySQL password were encoded GH-8040
  • ui: Fix deleting namespaces GH-8132
  • ui: Fix Error handler on kv-secret edit and kv-secret view pages GH-8133
  • ui: Fix OIDC callback to check storage GH-7929.
  • ui: Change .box-radio height to min-height to prevent overflow issues GH-8065

1.3.1 (December 18th, 2019)

IMPROVEMENTS:

  • agent: Add ability to set exit-after-auth via the CLI GH-7920
  • auth/ldap: Add a request_timeout configuration option to prevent connection requests from hanging GH-7909
  • auth/kubernetes: Add audience to tokenreview API request for Kube deployments where issuer is not Kube. GH-74
  • secrets/ad: Add a request_timeout configuration option to prevent connection requests from hanging [AD-59]
  • storage/postgresql: Add support for setting connection_url from enviornment variable VAULT_PG_CONNECTION_URL GH-7937
  • telemetry: Add enable_hostname_label option to telemetry stanza GH-7902
  • telemetry: Add accept header check for prometheus mime type GH-7958
... (truncated)
Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) - `@dependabot use these labels` will set the current labels as the default for future PRs for this repo and language - `@dependabot use these reviewers` will set the current reviewers as the default for future PRs for this repo and language - `@dependabot use these assignees` will set the current assignees as the default for future PRs for this repo and language - `@dependabot use this milestone` will set the current milestone as the default for future PRs for this repo and language - `@dependabot badge me` will comment on this PR with code to add a "Dependabot enabled" badge to your readme Additionally, you can set the following in your Dependabot [dashboard](https://app.dependabot.com): - Update frequency (including time of day and day of week) - Pull request limits (per update run and/or open at any time) - Out-of-range updates (receive only lockfile updates, if desired) - Security updates (receive only security updates, if desired)