philips-labs / dct-notary-admin

To manage Docker Content Trust and Notary certificates
MIT License
12 stars 1 forks source link

Bump github.com/hashicorp/vault/api from 1.8.0 to 1.8.3 #688

Closed dependabot[bot] closed 1 year ago

dependabot[bot] commented 1 year ago

Bumps github.com/hashicorp/vault/api from 1.8.0 to 1.8.3.

Release notes

Sourced from github.com/hashicorp/vault/api's releases.

v1.8.3

1.8.3

29 September 2021

IMPROVEMENTS:

  • secrets/pki: Allow signing of self-issued certs with a different signature algorithm. [GH-12514]

BUG FIXES:

  • agent: Avoid possible unexpected fault address panic when using persistent cache. [GH-12534]
  • core (enterprise): Allow deletion of stored licenses on DR secondary nodes
  • core (enterprise): Fix bug where password generation through password policies do not work on namespaces if performed outside a request callback or from an external plugin. [GH-12635]
  • core (enterprise): Only delete quotas on primary cluster. [GH-12339]
  • identity: Fail alias rename if the resulting (name,accessor) exists already [GH-12473]
  • raft (enterprise): Fix panic when updating auto-snapshot config
  • secrets/db: Fix bug where Vault can rotate static role passwords early during start up under certain conditions. [GH-12563]
  • secrets/openldap: Fix bug where Vault can rotate static role passwords early during start up under certain conditions. #28 [GH-12599]
  • secrets/transit: Enforce minimum cache size for transit backend and init cache size on transit backend without restart. [GH-12418]
  • storage/raft: Detect incomplete raft snapshots in api.RaftSnapshot(), and thereby in vault operator raft snapshot save. [GH-12388]
  • ui: Fix bug where capabilities check on secret-delete-menu was encoding the forward slashes. [GH-12550]
  • ui: Show day of month instead of day of year in the expiration warning dialog [GH-11984]

v1.8.2

1.8.2

26 August 2021

CHANGES:

  • go: Update go version to 1.16.7 [GH-12408]

BUG FIXES:

  • auth/aws: Fixes ec2 login no longer supporting DSA signature verification [GH-12340]
  • cli: vault debug now puts newlines after every captured log line. [GH-12175]
  • database/couchbase: change default template to truncate username at 128 characters [GH-12300]
  • identity: Fix a panic on arm64 platform when doing identity I/O. [GH-12371]
  • physical/raft: Fix safeio.Rename error when restoring snapshots on windows [GH-12377]
  • plugin/snowflake: Fixed bug where plugin would crash on 32 bit systems [GH-12378]
  • sdk/database: Fix a DeleteUser error message on the gRPC client. [GH-12351]
  • secrets/gcp: Fixes a potential panic in the service account policy rollback for rolesets. [GH-12379]
  • ui: Fixed api explorer routing bug [GH-12354]
  • ui: Fixes metrics page when read on counter config not allowed [GH-12348]
  • ui: fix issue where on MaskedInput on auth methods if tab it would clear the value. [GH-12409]

v1.8.1

1.8.1

August 5th, 2021

CHANGES:

... (truncated)

Changelog

Sourced from github.com/hashicorp/vault/api's changelog.

1.8.3

29 September 2021

IMPROVEMENTS:

  • secrets/pki: Allow signing of self-issued certs with a different signature algorithm. [GH-12514]

BUG FIXES:

  • agent: Avoid possible unexpected fault address panic when using persistent cache. [GH-12534]
  • core (enterprise): Allow deletion of stored licenses on DR secondary nodes
  • core (enterprise): Fix bug where password generation through password policies do not work on namespaces if performed outside a request callback or from an external plugin. [GH-12635]
  • core (enterprise): Only delete quotas on primary cluster. [GH-12339]
  • identity: Fail alias rename if the resulting (name,accessor) exists already [GH-12473]
  • raft (enterprise): Fix panic when updating auto-snapshot config
  • secrets/db: Fix bug where Vault can rotate static role passwords early during start up under certain conditions. [GH-12563]
  • secrets/openldap: Fix bug where Vault can rotate static role passwords early during start up under certain conditions. #28 [GH-12599]
  • secrets/transit: Enforce minimum cache size for transit backend and init cache size on transit backend without restart. [GH-12418]
  • storage/raft: Detect incomplete raft snapshots in api.RaftSnapshot(), and thereby in vault operator raft snapshot save. [GH-12388]
  • ui: Fix bug where capabilities check on secret-delete-menu was encoding the forward slashes. [GH-12550]
  • ui: Show day of month instead of day of year in the expiration warning dialog [GH-11984]

1.8.2

26 August 2021

CHANGES:

  • Alpine: Docker images for Vault 1.6.6+, 1.7.4+, and 1.8.2+ are built with Alpine 3.14, due to CVE-2021-36159
  • go: Update go version to 1.16.7 [GH-12408]

BUG FIXES:

  • auth/aws: Fixes ec2 login no longer supporting DSA signature verification [GH-12340]
  • cli: vault debug now puts newlines after every captured log line. [GH-12175]
  • database/couchbase: change default template to truncate username at 128 characters [GH-12300]
  • identity: Fix a panic on arm64 platform when doing identity I/O. [GH-12371]
  • physical/raft: Fix safeio.Rename error when restoring snapshots on windows [GH-12377]
  • plugin/snowflake: Fixed bug where plugin would crash on 32 bit systems [GH-12378]
  • sdk/database: Fix a DeleteUser error message on the gRPC client. [GH-12351]
  • secrets/gcp: Fixes a potential panic in the service account policy rollback for rolesets. [GH-12379]
  • ui: Fixed api explorer routing bug [GH-12354]
  • ui: Fixes metrics page when read on counter config not allowed [GH-12348]
  • ui: fix issue where on MaskedInput on auth methods if tab it would clear the value. [GH-12409]

1.8.1

August 5th, 2021

CHANGES:

  • go: Update go version to 1.16.6 [GH-12245]

... (truncated)

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
codecov[bot] commented 1 year ago

Codecov Report

Merging #688 (2581291) into main (9b6d7b5) will not change coverage. The diff coverage is n/a.

Additional details and impacted files [![Impacted file tree graph](https://codecov.io/gh/philips-labs/dct-notary-admin/pull/688/graphs/tree.svg?width=650&height=150&src=pr&token=nF2lQet9ca&utm_medium=referral&utm_source=github&utm_content=comment&utm_campaign=pr+comments&utm_term=philips-labs)](https://codecov.io/gh/philips-labs/dct-notary-admin/pull/688?src=pr&el=tree&utm_medium=referral&utm_source=github&utm_content=comment&utm_campaign=pr+comments&utm_term=philips-labs) ```diff @@ Coverage Diff @@ ## main #688 +/- ## ======================================= Coverage 52.80% 52.80% ======================================= Files 30 30 Lines 1392 1392 Branches 15 15 ======================================= Hits 735 735 Misses 557 557 Partials 100 100 ``` | Flag | Coverage Δ | | |---|---|---| | unittests | `52.80% <ø> (ø)` | | Flags with carried forward coverage won't be shown. [Click here](https://docs.codecov.io/docs/carryforward-flags?utm_medium=referral&utm_source=github&utm_content=comment&utm_campaign=pr+comments&utm_term=philips-labs#carryforward-flags-in-the-pull-request-comment) to find out more.
dependabot[bot] commented 1 year ago

Superseded by #695.