morningconsult / docker-credential-vault-login

Automatically gets docker credentials from Hashicorp Vault
Apache License 2.0
77 stars 11 forks source link

chore(deps): bump github.com/hashicorp/vault from 1.10.3 to 1.10.4 #93

Closed dependabot[bot] closed 2 years ago

dependabot[bot] commented 2 years ago

Bumps github.com/hashicorp/vault from 1.10.3 to 1.10.4.

Changelog

Sourced from github.com/hashicorp/vault's changelog.

1.10.4

June 10, 2022

CHANGES:

IMPROVEMENTS:

  • api/monitor: Add log_format option to allow for logs to be emitted in JSON format [GH-15536]
  • auth: Globally scoped Login MFA method Get/List endpoints [GH-15248]
  • auth: forward cached MFA auth response to the leader using RPC instead of forwarding all login requests [GH-15469]
  • cli/debug: added support for retrieving metrics from DR clusters if unauthenticated_metrics_access is enabled [GH-15316]
  • command/debug: Add log_format flag to allow for logs to be emitted in JSON format [GH-15536]
  • core: Fix some identity data races found by Go race detector (no known impact yet). [GH-15123]
  • storage/raft: Use larger timeouts at startup to reduce likelihood of inducing elections. [GH-15042]
  • ui: Allow namespace param to be parsed from state queryParam [GH-15378]

BUG FIXES:

  • agent: Redact auto auth token from renew endpoints [GH-15380]
  • auth/kubernetes: Fix error code when using the wrong service account [GH-15585]
  • auth/ldap: The logic for setting the entity alias when username_as_alias is set has been fixed. The previous behavior would make a request to the LDAP server to get user_attr before discarding it and using the username instead. This would make it impossible for a user to connect if this attribute was missing or had multiple values, even though it would not be used anyway. This has been fixed and the username is now used without making superfluous LDAP searches. [GH-15525]
  • auth: Fixed erroneous success message when using vault login in case of two-phase MFA [GH-15428]
  • auth: Fixed erroneous token information being displayed when using vault login in case of two-phase MFA [GH-15428]
  • auth: Fixed two-phase MFA information missing from table format when using vault login [GH-15428]
  • auth: Prevent deleting a valid MFA method ID using the endpoint for a different MFA method type [GH-15482]
  • core (enterprise): Fix overcounting of lease count quota usage at startup.
  • core: Prevent changing file permissions of audit logs when mode 0000 is used. [GH-15759]
  • core: Prevent metrics generation from causing deadlocks. [GH-15693]
  • core: fixed systemd reloading notification [GH-15041]
  • mfa/okta: disable client side rate limiting causing delays in push notifications [GH-15369]
  • storage/raft (enterprise): Auto-snapshot configuration now forbids slashes in file prefixes for all types, and "/" in path prefix for local storage type. Strip leading prefix in path prefix for AWS. Improve error handling/reporting.
  • transform (enterprise): Fix non-overridable column default value causing tokenization tokens to expire prematurely when using the MySQL storage backend.
  • ui: Fix inconsistent behavior in client count calendar widget [GH-15789]
  • ui: Fixed client count timezone for start and end months [GH-15167]
  • ui: fix firefox inability to recognize file format of client count csv export [GH-15364]
Commits
  • 6a1dde5 api/monitor: Adding log format to monitor command and debug (#15536) (#15791)
  • f7c004c Update changelog entry for go version bump to new standard (#15828)
  • f421d88 backport of commit c4289a20ab97f3baf2cc5e9f0d284f9841418614 (#15830)
  • 65a897d Backport 1.10.x: UI: calendar widget fix #15789 (#15799)
  • 0a1671a Update Go to 1.17.11 (#15822)
  • aba1978 backport of commit 1c284e8b021e2b1e999a5d44d62188ea88ba099e (#15794)
  • da9be7e backport of commit 0e8bcc15cc0201fd8416b36501af60f8b73de480 (#15784)
  • 548ae70 Backport of Add details to CHANGELOG and 1.10 upgrade note regarding new 412 ...
  • 6e36e0f backport of commit adb1effa831aafee1264fd4cfa3b70bf572b2b01 (#15766)
  • 5ebe51b backport of commit 20467b10f22dedb2800fab9b29dc75b42ecd01bd (#15763)
  • Additional commits viewable in compare view


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)